switch to basic browser
📂
📝
📟

🌲 / learning Testing - security The Complete Cybersecurity Bootcamp, 2nd Edition - Audio Lesson 26 Post-Exploitation Techniques

c File Name Size files dur q aq Ac Fmt T Date
-001. Learning objectives.mp422535531.7439915655aacmovmp42023-08-23 16:09:55
-002. 26.1 Maintaining Persistence After Compromising a System.mp43285705466.0480055655aacmovmp42023-08-23 16:09:56
-003. 26.2 Understanding How to Perform Lateral Movement and Pivoting.mp41473719208.9386855655aacmovmp42023-08-23 16:09:57
-004. 26.3 Understanding How to Cover Your Tracks and Clean up Systems After a Penetration Testing Engagement.mp4776281109.9729935655aacmovmp42023-08-23 16:09:58

control-panel

π
f69dc311a936 // 3.77 TiB free of 3.98 TiB