Practice Test Geeks home

PenTest+ PenTest+ Post-Exploitation & Pivoting

Which tool is commonly used for maintaining persistent access and post-exploitation activities after initial compromise?

Select your answer