- Advanced Infrastructure Penetration Testing
- Chiheb Chebbi
- 103字
- 2021-06-24 19:12:56
Post-exploitation
Getting root privileges is not the end of the road. As discussed before, maintaining access is an essential phase in hacking methodologies, thus post-exploitation is required to not only maintain access but to spread into the infrastructure, to further compromise the system. This phase is critical; the penetration tester simulates an advanced attack; that is why, rules of engagement should be agreed before conducting post-exploitation. This shows and supports the importance of the first pentesting phase (pre-engagement) to protect your client and of course, protect yourself.
Based on the penetration testing execution standard, a post-exploitation phase should go through six sections.
推薦閱讀
- Containerization with LXC
- Linux操作系統基礎
- Linux從零開始學(視頻教學版)
- Ansible權威指南
- 嵌入式應用程序設計綜合教程(微課版)
- Windows Phone應用程序開發
- Windows Server 2019 Administration Fundamentals
- Hands-On UX Design for Developers
- 計算機系統的自主設計
- CentOS 6 Linux Server Cookbook
- Learn CUDA Programming
- Linux內核API完全參考手冊(第2版)
- Linux應用大全 基礎與管理
- Linux從入門到精通(視頻教學版)
- Learn OpenShift