Video Description

This lesson focuses on using Ncat as a persistent backdoor for Windows. Participants see basic examples on how to use the command via screen by screen instructions.

Course Modules

Post Exploitation Hacking

Instructed By

Instructor Profile Image
Joe Perry
Instructor