- Advanced Infrastructure Penetration Testing
- Chiheb Chebbi
- 103字
- 2021-06-24 19:12:56
Post-exploitation
Getting root privileges is not the end of the road. As discussed before, maintaining access is an essential phase in hacking methodologies, thus post-exploitation is required to not only maintain access but to spread into the infrastructure, to further compromise the system. This phase is critical; the penetration tester simulates an advanced attack; that is why, rules of engagement should be agreed before conducting post-exploitation. This shows and supports the importance of the first pentesting phase (pre-engagement) to protect your client and of course, protect yourself.
Based on the penetration testing execution standard, a post-exploitation phase should go through six sections.
推薦閱讀
- Puppet實戰
- 深入Linux內核架構與底層原理(第2版)
- 奔跑吧 Linux內核(入門篇)
- Linux自動化運維:Shell與Ansible(微課版)
- 注冊表應用完全DIY
- OpenStack系統架構設計實戰
- Linux軟件管理平臺設計與實現
- Windows Server 2008組網技術與實訓(第3版)
- OpenVZ Essentials
- Office 365 User Guide
- Linux操作系統案例教程(第2版)
- BuddyPress Theme Development
- Gradle Effective Implementations Guide(Second Edition)
- Docker for Developers
- Windows 11使用方法與技巧從入門到精通