08.post Exploitation Hacking
08.post Exploitation Hacking
January 1, 2016
1 Introduction
Get started with Post Exploitation Hacking by viewing the course videos below.
Learn Information Gathering, Backdooring and Covering Steps – and how to
use system specific tools to get info about a system and its users, how to access
the compromised system at any time, and how to hide your activity from system
administrators.
2 Section 1
1
3 Section 2
2
Topic title Topic description
14. Windows Network Informa- Participants learn about nslookup, and about net suite
tion Gathering Lecture (part 1) tools.
This lesson picks up from the previous lesson and focuses
15. Windows Network Informa-
on the following tools in the Net suite: Session, Statistics,
tion Gathering Lecture (part 2)
View, and Start.
16. Windows Network Informa- The focus of this lesson is Windows Management Instru-
tion Gathering Lecture (part 3) mentation (Wmic) line command.
4 Section 3
3
5 Section 4