In this chapter, we've covered a wide range of topics ranging from bypassing firewalls to interacting with websites. We've performed these tasks after usage of various tools and different methodologies, which enabled us to attack the victim machine with our attacker machine or encrypt and decrypt our messages.
In this next chapter, we'll cover privilege escalations pertaining to weak service file permissions, preparing vulnerable software, breaching legitimate windows service via a backdoor, and creating a new admin account.