Post Exploitation: Performing Infrastructure Analysis
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 1 Hours | 114 MB
Genre: eLearning | Language: English
Everything that comes after the shell during a penetration test is called post exploitation. This course introduces post exploitation and performing infrastructure analysis through service and configuration enumeration in a compromised network.