Introduction

File Transfers

Maintaining access

<aside> πŸ“— As ethical hacker it’s not the main job

</aside>

β‡’ open a port without authentification mechanism, which is dangerous

Pivoting

Access to a machine which we have no access except using intermediary machine.