- Learn Penetration Testing
- Rishalin Pillay
- 99字
- 2021-06-24 14:09:09
Post-exploitation
Post-exploitation covers activities that can be performed once a target is successfully exploited.
The post-exploitation phase really showcases your skills as a penetration tester. When malicious hackers breach a system, they start to trawl the environment looking for high-value targets. They also start creating backdoors so that they can easily revisit the compromised system.
As a penetration tester, you would perform tasks as if you were an attacker. Once you have breached a system, it's time to look for high-value targets and valuable information, attempt to access escalated privileges, move laterally, and look at how you can pivot.
推薦閱讀
- 胃腸間質(zhì)瘤科普教育手冊(cè)
- 眼科手術(shù)操作與技巧(第2版)
- 醫(yī)院醫(yī)療質(zhì)量標(biāo)準(zhǔn)化管理手冊(cè)
- 現(xiàn)代口腔正畸技術(shù)與臨床思維(現(xiàn)代實(shí)用口腔醫(yī)學(xué)著譯叢書)
- 意識(shí)障礙康復(fù)評(píng)定與治療學(xué)
- 出生缺陷與遺傳性疾病的檢驗(yàn)診斷
- 牙齒健康與口腔保健手冊(cè)
- 針灸學(xué)基本概念術(shù)語(yǔ)通典(上下冊(cè))
- 走進(jìn)孤獨(dú)的世界:為家長(zhǎng)專業(yè)解讀自閉癥
- 運(yùn)動(dòng)創(chuàng)傷學(xué)
- 口腔科常見及多發(fā)病就醫(yī)指南系列:口腔頜面部腫瘤就醫(yī)指南
- 脊髓損傷者生活自助手冊(cè)
- Building Serverless Microservices in Python
- 眼科疾病防治手冊(cè)
- 十死換一生:我戰(zhàn)勝了抑郁癥