
Cybrary – Post Exploitation Hacking – Persistence and Continued Access 2015
English | Size: 1.33 GB (1,428,108,989 bytes)
Category: Tutorial
In this free self-paced online training course, you’ll cover three main topics: Information Gathering, Backdooring and Covering Steps. You’ll learn about how to use system specific tools to get general information about a system and its users, how to access the compromised system at any time, and how to hide your activity from system administrators.
[Read more…]