官术网_书友最值得收藏!

Post-exploitation

Getting root privileges is not the end of the road. As discussed before, maintaining access is an essential phase in hacking methodologies, thus post-exploitation is required to not only maintain access but to spread into the infrastructure, to further compromise the system. This phase is critical; the penetration tester simulates an advanced attack; that is why, rules of engagement should be agreed before conducting post-exploitation. This shows and supports the importance of the first pentesting phase (pre-engagement) to protect your client and of course, protect yourself.

Based on the penetration testing execution standard, a post-exploitation phase should go through six sections.

主站蜘蛛池模板: 万源市| 无为县| 泰和县| 五华县| 仁化县| 肇东市| 扬州市| 玛沁县| 长宁县| 青岛市| 阳曲县| 黄冈市| 育儿| 南雄市| 泾川县| 阿城市| 保山市| 明水县| 崇义县| 宝兴县| 韩城市| 凉城县| 松溪县| 阳朔县| 城固县| 永和县| 巴林左旗| 汕头市| 临武县| 宜川县| 康马县| 绥德县| 岐山县| 正宁县| 祁门县| 磐石市| 元江| 昆明市| 花垣县| 南通市| 涞水县|