Post Exploitation

From The Penetration Testing Execution Standard
Jump to navigation Jump to search

This section details the post-exploitation elements that should be addressed in a penetration test.
Following is an image depicting the main branches of the corresponding mindmap:
Post-exploit.png