Part 3: Post-Exploitation

In this section, we will explore the phases of attack after the initial foothold in an organization. We will discuss conducting recon from that unique viewpoint to discover new hosts, lateral movement with the details we already have, and compromising accounts with higher privileges to allow for even more movement into the network. We wrap up with a discussion on maintaining access to our compromised resources. 

This part of the book comprises the following chapters:

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset