From the course: CompTIA PenTest+ (PT0-003) Cert Prep

Unlock this course with a free trial

Join today to access over 25,500 courses taught by industry experts.

Post-exploitation techniques

Post-exploitation techniques

- So we've spent a lot of time talking about planning our PenTesting engagement, and then actually breaking in. If we leverage an exploit, we can gain access to some resource. We've talked about this over and over again. But once you do it, what then? Are you done? Well, no, you're not done at all. In fact, that's where the fun begins. So post-exploitation techniques all talk about what do you do once you're in? The first thing you wanna do, once you've made it inside, is you wanna make it easier next time. So basically you think about if you go to the trouble of repelling down the side of a building and breaking into the side of an office building, what you wanna do next is you wanna go open the door, so next time you can walk in the front door. You wanna make it easy. So let's talk about lateral movement techniques, so that once we're in, we wanna move around inside the the target architecture and place things…

Contents