
Cybrary – Post Exploitation Hacking
English | Size: 1.33 GB (1,428,108,989 Bytes)
Category: Tutorial
You’ll learn about how to use system specific tools to get general information about a system and its users, how to access the compromised system at any time, and how to hide your activity from system administrators. Additionally, you’ll master how to use listener shells, metasploit and meterpreter scripting.
[Read more…]