Curriculum
Course: Ethical Hacking / Penetration Testing
Login
Text lesson

Lesson 8: Exploitation with Metasploit

 

  • Perform system exploitation using Metasploit modules.

  • Maintain access using backdoors and persistence techniques.