[OLD-CONTENT] How To Post Exploit Using Kali Linux