Video Description

This lesson focuses on post exploitation, which occurs after exploitation, gaining access to the first machine on a network. This lesson discusses the rules of engagement:

  • 18 U.S.C. 1030: The Computer Fraud and Abuse Act: Violation of this act could cost millions of dollars in fines and jail time. Basically, if you don't have permission to be doing it, don't do it!
  • Expectations, permissions and ALL the paperwork: Speak with a client/customer at the beginning to find out exactly what they want and get it all on paper.

Participants also learn about protecting their client by documenting everything as well as protecting themselves by discussing everything with a client, making sure a statement of work is signed by themselves and the client and making sure they are in compliance and not breaking any laws.

Course Modules

Post Exploitation Hacking

Instructed By

Instructor Profile Image
Joe Perry