官术网_书友最值得收藏!

Post-exploitation

Getting root privileges is not the end of the road. As discussed before, maintaining access is an essential phase in hacking methodologies, thus post-exploitation is required to not only maintain access but to spread into the infrastructure, to further compromise the system. This phase is critical; the penetration tester simulates an advanced attack; that is why, rules of engagement should be agreed before conducting post-exploitation. This shows and supports the importance of the first pentesting phase (pre-engagement) to protect your client and of course, protect yourself.

Based on the penetration testing execution standard, a post-exploitation phase should go through six sections.

主站蜘蛛池模板: 神农架林区| 建湖县| 红桥区| 玉树县| 彭泽县| 奉新县| 庆城县| 庆城县| 芦山县| 永靖县| 禄劝| 南皮县| 集安市| 夏津县| 广饶县| 诸暨市| 繁昌县| 闸北区| 乌海市| 天津市| 四会市| 龙山县| 灌南县| 盘锦市| 沙田区| 平江县| 扎鲁特旗| 韩城市| 潮安县| 常熟市| 时尚| 通州市| 沙坪坝区| 穆棱市| 阿合奇县| 江门市| 定陶县| 温宿县| 如东县| 湖州市| 清新县|