In this section, we will explore techniques that are used post exploitation. You will learn how to apply various techniques to perform lateral movement, privilege escalation, and pivoting. We will explore the various ways that technical controls, such as antivirus measures, can be evaded using tools and custom shell codes. You will learn how to maintain access within a compromised network using persistence techniques.
The following chapters will be covered in this section:
- Chapter 10, Moving Laterally and Escalating Your Privileges
- Chapter 11, Antivirus Evasion
- Chapter 12, Maintaining Control within the Environment