eJPT - 3.5 Post-Exploitation
Introduction
Post-exploitation is the final phase of a penetration test. it consists of the tactics, techniques and procedures that attackers undertake after obtaining initial access on a target system. It involves what you do once you have gained an...
hmadsec.hashnode.dev19 min read