Video Description

This lesson focuses on using Ncat as a persistent backdoor for Windows. Participants see basic examples on how to use the command via screen by screen instructions.

Course Modules

Post Exploitation Hacking