官术网_书友最值得收藏!

  • Learn Penetration Testing
  • Rishalin Pillay
  • 99字
  • 2021-06-24 14:09:09

Post-exploitation

Post-exploitation covers activities that can be performed once a target is successfully exploited.

The post-exploitation phase really showcases your skills as a penetration tester. When malicious hackers breach a system, they start to trawl the environment looking for high-value targets. They also start creating backdoors so that they can easily revisit the compromised system.

As a penetration tester, you would perform tasks as if you were an attacker. Once you have breached a system, it's time to look for high-value targets and valuable information, attempt to access escalated privileges, move laterally, and look at how you can pivot.

主站蜘蛛池模板: 乐昌市| 多伦县| 乌拉特后旗| 泰宁县| 舞阳县| 区。| 凉城县| 星子县| 新邵县| 清镇市| 镇江市| 安徽省| 仙游县| 宿迁市| 内丘县| 镇赉县| 东乌| 贵德县| 双牌县| 辽中县| 克拉玛依市| 双城市| 台东市| 西林县| 伊春市| 左云县| 泸溪县| 昌平区| 炎陵县| 巩留县| 凤台县| 揭东县| 临夏县| 永和县| 龙江县| 闽清县| 新乡市| 碌曲县| 平乡县| 桦川县| 子长县|