Description: In this Video Raphael Mudge Talking About Post Exploitation. In this video we can learn after compromise a system what other things can you do like Access Management, Set a keystrokes, steal username and passwords etc etc..
Overview :- Interact with the host, Explore the system, Access Management, Post Modules and Loot.
Tags: Post-Exploitation , exploit ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.
No doubt using this tool exploitation is so easy mistake chances is low.