Hands-On Web Penetration Testing with Metasploit
上QQ阅读APP看书,第一时间看更新

Post-exploitation

Post-exploitation is the stage where the goal is to determine the criticality of the compromise and then maintain access for future use. This phase must always follow the rules of engagement that protect the client and protect ourselves (covering the tracks as per the requirements of the activity).