Python for Network Forensics 5.4: Post Enumeration

Python for Network Forensics 5.4: Post Enumeration

Assessment

Interactive Video

Information Technology (IT), Architecture

University

Hard

Created by

Quizizz Content

FREE Resource

This lesson focuses on post-enumeration techniques, specifically privilege escalation using a reverse shell. It introduces the Linux Proof Checker script, which identifies privilege escalation vulnerabilities. The script's functionality, including system and network information gathering, is explained. The lesson concludes with practical applications and a preview of data exfiltration techniques.

Read more

1 questions

Show all answers

1.

OPEN ENDED QUESTION

3 mins • 1 pt

What new insight or understanding did you gain from this video?

Evaluate responses using AI:

OFF