Did you know Cybrary's video training is FREE? Join more than 2,500,000 IT and cyber security professionals, students, career changers, and more, growing their careers on Cybrary.
This lesson focuses on running post exploitation modules from an open session. Participants learn step by step instructions on post exploitation modules using the meterpreter command which allows programmers to set a payload. This lesson also covers how to exploit a database using the Kali Linux system.