This is Part 8 of the Metasploit Megaprimer series. Please begin this series by starting by watching Part 1 of the Metasploit Megaprimer series, if you have not already done so.
In this video, we will learn how to do post exploitation kung fu :) Very broadly, post exploitation consists of the following steps:
1. Understanding the Victim better
2. Privilege Escalation
3. Deleting Logs and Killing Monitoring software
4. Collecting Data, Executing programs etc. on the Victim
5. Backdoors and Rootkits
6. Using victim as a Pivot to hack deeper into the network
In this video, we will look at the first step, which is "Understanding the Victim better".
Would request you all to leave your feedback in the comments section below the video!In the next video, we will learn about the Privilege Escalation phase of Post Exploitation!! Please watch this video in FULL SCREEN mode.
Tags: tools ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.