BEAT THE HEAT: 25% OFF ANNUAL SUBSCRIPTIONS

00days
:
10hr
:
19min
:
19sec
Back to all modules

Post Compromise

Post Compromise icon

Learn about the steps taken by an attacker right after gaining an initial foothold on a network.

After gaining access to your target network, get ready to learn how to establish your first point of persistence, elevate privileges locally, gain awareness of your surroundings and gather enough information to plan your future moves carefully. By the end of the module, you will gain the skills required to secure your initial foothold and identify key points on the network that you can later use to define your attack strategy.

Post Compromise icon

We use cookies to ensure you get the best user experience. For more information contact us.

Read more