Post Exploitation
As the name implies, everything after the exploit lands is “post-exploitation.” It’s not what exploit you use, it’s what you do with it.
General PostEx Options
- Steal data
- Move laterally
- Make changes
- Persistence
As the name implies, everything after the exploit lands is “post-exploitation.” It’s not what exploit you use, it’s what you do with it.