Video Description

This lesson focuses on writing vulnerable software to develop exploits. Participants learn step by step instructions to drop into a shell using net commands to develop exploits. This lesson also discusses how to use the impersonate tokens demand to impersonate other users and log into a system.

Course Modules

Advanced Penetration Testing