Difference between revisions of "Post Exploitation"

From The Penetration Testing Execution Standard
Jump to navigation Jump to search
(Created page with "This section details the post-exploitation elements that should be addressed in a penetration test.<br /> Following is an image depicting the main branches of the corresponding m...")
 
(No difference)

Revision as of 11:50, 2 March 2011

This section details the post-exploitation elements that should be addressed in a penetration test.
Following is an image depicting the main branches of the corresponding mindmap:
Post-exploit.png