PDC4S:\Hacking\SEC560 - Network Penetration Testing and Ethical Hacking\Section3 - Exploitation\3.6 Post Exploitation with Empire