This lesson focuses on post exploitation, which occurs after exploitation, gaining access to the first machine on a network. This lesson discusses the rules of engagement:
- 18 U.S.C. 1030: The Computer Fraud and Abuse Act: Violation of this act could cost millions of dollars in fines and jail time. Basically, if you don't have permission to be doing it, don't do it!
- Expectations, permissions and ALL the paperwork: Speak with a client/customer at the beginning to find out exactly what they want and get it all on paper.
Participants also learn about protecting their client by documenting everything as well as protecting themselves by discussing everything with a client, making sure a statement of work is signed by themselves and the client and making sure they are in compliance and not breaking any laws.
Post Exploitation Hacking
In this self-paced online training course, you will cover three main topics: Information Gathering, Backdooring and Covering Steps, how to use system specific tools to get general information, listener shells, metasploit and meterpreter scripting.