Answer/solve the following questions and exercises based on material covered in this chapter:
- Repeat the exercises covered in this chapter
- Try decoding other samples from the Challenges directory on GitHub (https://github.com/nipunjaswal/networkforensics/tree/master/Challenges)
- Which of these use TLV as standard for communication?
- Metasploit
- Empire
- Which of these use beaconing for keeping the attacker informed about a target being live?
- Metasploit
- Empire
- Both
- None of the above