The Pentesting Guide
TwitterBlog
  • The Pentesting Guide
  • โ„น๏ธ0 - Pre-Engagement
  • ๐Ÿ”1 - Information Gathering
  • Passive (OSINT)
  • Active
    • ๐Ÿ•ต๏ธHUMINT
    • WIFI
    • IP & Port Scanning
    • Services
      • 21 - FTP
      • 22 - SSH
      • 25 - SMTP
      • 53 - DNS
      • 80,443 - WEB
      • 88 - Kerberos
      • 110 - POP3
      • 111 - rpcbind
      • 161 - SNMP
      • 389 - LDAP
      • 139,445 - SMB
      • Active Directory
  • ๐Ÿ’ฃ2 - Exploitation
  • Brute Forcing
  • WEB
    • Apache Tomcat
    • Authentication
    • Broken Access Control
    • Cache poisoning
    • Clickjacking
    • CORS
    • CSRF
    • File Inclusion
    • Host Header Injection
    • HTTP Request Smuggling
    • Information disclosure
    • JWT
    • OS command injection
    • PHP deserialisation
    • SQLi
    • SSRF
    • SSTI
    • Shellshock
    • Unrestricted File Upload
    • XSS
    • XXE
  • Web (OWASP Test cases)
    • 4.1 Information Gathering
    • 4.2 Configuration and Deployment Management Testing
    • 4.3 Identity Management Testing
    • 4.4 Authentication Testing
    • 4.5 Authorization Testing
    • 4.6 Session Management Testing
    • 4.7 Input Validation Testing
    • 4.8 Testing for Error Handling
    • 4.9 Testing for Weak Cryptography
    • 4.10 Business Logic Testing
    • 4.11 Client-side Testing
    • 4.12 API Testing
  • WIFI
  • HUMINT
    • ๐ŸŽฃGophish (Phishing)
    • Malicious Phishing Files
    • Phishing Evaluation
  • BoF - Windows(x86)
  • Active Directory
    • Kerberos
    • GPOs
    • Certificates
    • LAPS
    • Domain Trusts
  • ๐Ÿ‘ฟ3 - Post Exploitation
  • File transfer
  • Shells
  • Situational Awareness
    • Containers and VMs
    • Linux
    • Windows
      • Dumping Credentials
      • Countermeasure Evasion
    • Active Directory
      • BloodHound & SharpHound
  • General
    • Linux
    • Windows
  • Local Privilege Escalation
    • Linux
    • Windows
  • Persistance
    • Windows
  • Cracking
  • Pivoting
    • Tunnelling & Port Forwarding
  • Lateral Movement
  • WIFI
  • ๐Ÿ““4 - Report
  • ๐Ÿงน5 - House cleaning
Powered by GitBook
On this page

3 - Post Exploitation

The post-exploitation phase in a pentesting determines the value of the compromised assets by assessing the impact of the vulnerability through the sensitivity of the data stored and the potential financial losses that may occur because of the attack.

After exploiting a vulnerability and getting inside the system on an engagement, it is time to gather more information on the exploited system, obtain persistence, escalate privileges and move from system to system, further compromising the company's network. However, if the Rules of Engagement do not allow these tasks, the Rules of Engagement must be followed.

Last updated 2 years ago

๐Ÿ‘ฟ