Which of the following ethical hacking tools is commonly employed for post-exploitation privilege escalation?
Metasploit Framework
John the Ripper
Wireshark
Nmap

Network Ethical Hacking Übungen werden geladen ...