Please enable JavaScript.
Coggle requires JavaScript to display documents.
Post Exploitation (Phases of Post exploitation (Cleaning tracks and…
-
-
-
post-exploitation rootkit Hooks a zombie, Elevates integrity, Dumps SAM/SECURITY, Pivots to another machine
-
-
-
-
-
-
-
-
-
Metasploit offers a number of post exploitation modules that allow for further information gathering on your target network.
-
-
-
-
-
-
parses the .lnk files in a users Recent Documents which could be useful for further information gathering
-
-
-