These below topics are covered in this course
- Understanding This Stage
- Gaining Access – Cracking Passwords
- More Cracking
- Gaining Access – Escalating Privileges
- Maintaining Access – Executing Applications
- Maintaining Access – Hiding Your Tools
- Covering Your Tracks – Clearing Logs and Evidence