- Learn Penetration Testing
- Rishalin Pillay
- 99字
- 2021-06-24 14:09:09
Post-exploitation
Post-exploitation covers activities that can be performed once a target is successfully exploited.
The post-exploitation phase really showcases your skills as a penetration tester. When malicious hackers breach a system, they start to trawl the environment looking for high-value targets. They also start creating backdoors so that they can easily revisit the compromised system.
As a penetration tester, you would perform tasks as if you were an attacker. Once you have breached a system, it's time to look for high-value targets and valuable information, attempt to access escalated privileges, move laterally, and look at how you can pivot.
推薦閱讀
- 腫瘤營養(yǎng)診療規(guī)程
- 實用口腔正畸臨床技術(shù)圖譜
- 2021中國腫瘤登記年報(漢英)
- Hands-On RESTful Web Services with TypeScript 3
- 皮膚美容激光治療原理與技術(shù)
- 預防老年人跌倒健康教育教程(老年人用書)
- 臍帶間充質(zhì)干細胞轉(zhuǎn)化醫(yī)學
- 癲癇綜合征管理手冊
- 呼吸與危重癥醫(yī)學2014-2015
- 重癥肺病名醫(yī)學術(shù)經(jīng)驗傳承與實踐
- 口腔科常見及多發(fā)病就醫(yī)指南系列:口腔頜面部腫瘤就醫(yī)指南
- 醫(yī)事法學
- 急性中毒與解救
- 塵肺病的護理與康復
- Expert GeoServer