Vulnerability Exploitation Techniques
Post exploitation involves securing ana elevating the control on target machine
Few post exploitation process/techniques to achieve above are mentioned below
Keep visiting....for more...
Few post exploitation process/techniques to achieve above are mentioned below
- Uploading File/Tools
- Elevating privileges
- Installing backdoor
- Cleaning up evidence of attack
- Expand attack to additional network or system.
Keep visiting....for more...
Comments
Post a Comment