官术网_书友最值得收藏!

  • Learn Penetration Testing
  • Rishalin Pillay
  • 99字
  • 2021-06-24 14:09:09

Post-exploitation

Post-exploitation covers activities that can be performed once a target is successfully exploited.

The post-exploitation phase really showcases your skills as a penetration tester. When malicious hackers breach a system, they start to trawl the environment looking for high-value targets. They also start creating backdoors so that they can easily revisit the compromised system.

As a penetration tester, you would perform tasks as if you were an attacker. Once you have breached a system, it's time to look for high-value targets and valuable information, attempt to access escalated privileges, move laterally, and look at how you can pivot.

主站蜘蛛池模板: 锡林浩特市| 简阳市| 深圳市| 佛教| 理塘县| 民权县| 铜山县| 高台县| 浦县| 公安县| 平顺县| 景宁| 高青县| 黄骅市| 富源县| 石家庄市| 江孜县| 柳河县| 太湖县| 台州市| 原阳县| 徐闻县| 彭州市| 安多县| 金沙县| 托里县| 遵化市| 安图县| 巫溪县| 安阳市| 古田县| 通河县| 时尚| 乳源| 双鸭山市| 特克斯县| 红河县| 华宁县| 潮安县| 长泰县| 商南县|