Skip to content

Post-Exploitation

ℹ️ Informations

  • 🌐 Website: HackTheBox
  • 📚 Module: Penetration Testing Process
  • 🔗 Link: Post-Exploitation

Question

How many types of evasive testing are mentioned in this section?

📋 Walkthrough

Just read the module page

Answer

3


Question

What is the name of the security standard for credit card payments that a company must adhere to? (**Answer** Format: acronym)

📋 Walkthrough

Just read the module page

Answer

PCI-DSS