官术网_书友最值得收藏!

Post-exploitation

Getting root privileges is not the end of the road. As discussed before, maintaining access is an essential phase in hacking methodologies, thus post-exploitation is required to not only maintain access but to spread into the infrastructure, to further compromise the system. This phase is critical; the penetration tester simulates an advanced attack; that is why, rules of engagement should be agreed before conducting post-exploitation. This shows and supports the importance of the first pentesting phase (pre-engagement) to protect your client and of course, protect yourself.

Based on the penetration testing execution standard, a post-exploitation phase should go through six sections.

主站蜘蛛池模板: 保山市| 永新县| 登封市| 锡林浩特市| 名山县| 涟源市| 扶风县| 鄂州市| 连城县| 葫芦岛市| 兴化市| 开化县| 个旧市| 徐闻县| 桦南县| 靖远县| 北川| 比如县| 梨树县| 九龙坡区| 修水县| 大英县| 垫江县| 和政县| 新沂市| 永胜县| 武安市| 临沂市| 凤山县| 报价| 惠安县| 渑池县| 织金县| 琼中| 东乡族自治县| 津南区| 武邑县| 迭部县| 平罗县| 朝阳县| 平度市|