- Advanced Infrastructure Penetration Testing
- Chiheb Chebbi
- 103字
- 2021-06-24 19:12:56
Post-exploitation
Getting root privileges is not the end of the road. As discussed before, maintaining access is an essential phase in hacking methodologies, thus post-exploitation is required to not only maintain access but to spread into the infrastructure, to further compromise the system. This phase is critical; the penetration tester simulates an advanced attack; that is why, rules of engagement should be agreed before conducting post-exploitation. This shows and supports the importance of the first pentesting phase (pre-engagement) to protect your client and of course, protect yourself.
Based on the penetration testing execution standard, a post-exploitation phase should go through six sections.
推薦閱讀
- Citrix XenApp Performance Essentials
- 每天5分鐘玩轉Kubernetes
- 曝光:Linux企業運維實戰
- Linux性能優化
- SharePoint 2013 應用開發實戰
- Kubernetes從入門到實踐
- 嵌入式Linux應用開發菜鳥進階
- Windows Server 2012網絡操作系統項目教程(第4版)
- Hands-On UX Design for Developers
- Advanced Infrastructure Penetration Testing
- Android應用性能優化最佳實踐
- Docker容器技術與應用
- Learning IBM Watson Analytics
- Less Web Development Essentials
- Responsive Web Design with AngularJS