This section details the post-exploitation elements that should be addressed in a penetration test. Following is an image depicting the main branches of the corresponding mindmap: