Post Exploitation: Performing Infrastructure Analysis
PluralsightEverything that comes after the shell during a penetration test is called post exploitation. This course introduces post exploitation and performing infrastructure analysis through service and configuration enumeration in a compromised network.