Week-10 discussion NS

Select a post-exploitation attack tool that may be used by an attacker. Explain how the tool works and how a defender may prevent and detect this tool from being successful. 

Make sure your post is at least 250 words

Tags: No tags