After exploiting a vulnerability and getting inside the system on an engagement, it is time to gather more information on the exploited system, obtain persistence, escalate privileges and move from system to system, further compromising the company's network. However, if the Rules of Engagement do not allow these tasks, the Rules of Engagement must be followed.