3 - Post Exploitation

Introduction

The post-exploitation phase in a pentesting determines the value of the compromised assets by assessing the impact of the vulnerability through the sensitivity of the data stored and the potential financial losses that may occur because of the attack.
After exploiting a vulnerability and getting inside the system on an engagement, it is time to gather more information on the exploited system, obtain persistence, escalate privileges and move from system to system, further compromising the company's network. However, if the Rules of Engagement do not allow these tasks, the Rules of Engagement must be followed.
Copy link