1 00:00:00,120 --> 00:00:02,910 My friends we are in the home stretch. 2 00:00:02,910 --> 00:00:05,310 I'm getting sadder by the day. 3 00:00:05,310 --> 00:00:08,180 So welcome to post exploitation. 4 00:00:08,190 --> 00:00:12,030 This is the last section in the networking section. 5 00:00:12,090 --> 00:00:18,600 So after this we're gonna be done with networking we're going to move on to Web apps into wireless and 6 00:00:18,600 --> 00:00:21,220 then we're gonna be wrapping up shortly after that. 7 00:00:21,570 --> 00:00:27,690 So post exploitation we are going to cover a few different topics but we're going to cover them at a 8 00:00:27,690 --> 00:00:28,920 high level. 9 00:00:29,040 --> 00:00:35,400 So the big three that we already covered we covered information gathering we covered scanning an enumeration 10 00:00:35,540 --> 00:00:38,720 and we covered exploitation and we covered are ready. 11 00:00:38,730 --> 00:00:45,590 A lot of Post's exploitation when it came to Active Directory and a lot of those concepts apply anyways. 12 00:00:45,750 --> 00:00:48,360 When it comes to external pen testing. 13 00:00:48,360 --> 00:00:55,620 So what we have left is we have just a little bit of material in theory so I'm going to talk to you 14 00:00:55,620 --> 00:01:00,750 about file transfers and you've already seen file transfers many different times through the course. 15 00:01:00,750 --> 00:01:02,610 So I'm just going to review that. 16 00:01:02,790 --> 00:01:07,290 We're going to talk about maintaining access and just some thoughts and concepts behind it. 17 00:01:07,290 --> 00:01:11,070 We're not going to focus on it and then we're gonna talk about pivoting. 18 00:01:11,070 --> 00:01:15,680 We're actually going to do a pivoting lab just so you can see what pivoting looks like. 19 00:01:15,690 --> 00:01:22,350 In one example of pivoting and then we're going to talk about cleanup again at a high level and cleanup 20 00:01:22,350 --> 00:01:28,680 as a pen tester versus what cleanup would be if you are a hacker or a red timer and what they mean by 21 00:01:28,680 --> 00:01:29,220 it. 22 00:01:29,220 --> 00:01:35,810 So this is gonna be more of a theory than a hands on section although the pivoting will be hands on. 23 00:01:35,880 --> 00:01:38,210 So I'm going to take you through a few videos. 24 00:01:38,220 --> 00:01:43,200 This will be pretty quick section and then we'll move on to Web apps and have some some fun and web 25 00:01:43,200 --> 00:01:43,940 apps as well. 26 00:01:43,950 --> 00:01:45,750 So let's go ahead and get started. 27 00:01:45,750 --> 00:01:48,600 Let's talk about file transfers in reviews of the techniques their.