Advanced
Post-Exploitation
Post-Exploitation & Reporting
Learn what happens after initial access: Linux and Windows privilege escalation, persistence mechanisms, lateral movement, pivoting, and how to write professional pentest reports with accurate CVSS scoring.
Lessons
- Linux Privilege Escalation (enroll to unlock)
- Windows Privilege Escalation (enroll to unlock)
- Persistence & Lateral Movement (enroll to unlock)
- Pentest Reporting & CVSS Scoring (enroll to unlock)