Post-Exploitation Kill AV and Firewall
Videos from Pentesting with Metasploit
-
Post Exploitation Privilege Escalation -
You are watching this now -
Post-Exploitation: Stdapi and Priv Extensions -
Post-Exploitation: Token Stealing and Incognito