L9 Exploiting Host-Based Vulnerabilities

Please purchase the course before starting the lesson.

Introduction You've targeted the major computing assets an organization must keep protected—networks, hosts, and applications—and have done what you can to exploit their weaknesses. This was the core phase of the pen test, but there's still more left to do. You need to engage in post-exploitation tasks in order to evade security countermeasures and maintain [...]

Back to: Ultimate IT Security Certification Bundle > Pentest +