Week 11

On our eleventh session in ethical hacking and penetration testing, our main topic was about maintaining access. This is the last step of penetration testing because once u get to maintain your access on a server, you can mostly do anything in the server and all you need to do is to maintain its access. Maintaining access is not as easy as we thought because we have to keep maintaining it and we have to be careful so we don’t make fatal mistakes. There are some ways to maintain access such as tunneling. Maintaining access should be performed after you gain access to its root

Category: Uncategorized
You can follow any responses to this entry through the RSS 2.0 feed. You can leave a response, or trackback from your own site.
Leave a Reply

XHTML: You can use these tags: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>