Tips for an Information Security Analyst/Pentester career - Ep. 46: Post-exploitation (pt. 2)

In this post, we'll keep analyzing post-exploitation tools and techniques. a) Recording keystrokes We can start a keylogger on the victim machine with keyscan_start. Anything we type in the victim...

peerlyst.com