Post exploitation is what things to do after the fact, when you have already broken into (hacked) a system. The three main goals of this course are to teach the attendees the steps of Information Gathering, Backdooring and then Covering Up Your Steps.
Learning Objectives
- Information Gathering
- Backdooring
- Covering Steps