Chapter-9 LEC-2, | Post Connection Settings | #ethicalhacking