Читать книгу Web Penetration Testing - Radhi Shatob - Страница 15
Exploitation and post Exploitation phase
ОглавлениеAlso known as gaining access and maintaining access to the target systems.
Exploitation is taking control of one or more network devices in order to either extract data from the target or use the device to then launch attacks.
Post Exploitation
Maintaining control of the machine for later use.
Determining the value of the compromised machine.
Value is determined by the sensitivity of the data stored and usefulness of the machine for further use.