Module 6. System Hacking
1. Gain access to the system2. Privilege Escalation3. Maintain Remote Access and Hide Malicious Activities4. Clear Logs to hide the Evidence of Compromise5. Active Directory (AD) Attacks
Last updated
Was this helpful?
Last updated
Was this helpful?