Post Exploitation

From The Penetration Testing Execution Standard
Revision as of 11:37, 2 March 2011 by Iamit (talk | contribs) (Created page with "This section details the post-exploitation elements that should be addressed in a penetration test.<br /> Following is an image depicting the main branches of the corresponding m...")
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

This section details the post-exploitation elements that should be addressed in a penetration test.
Following is an image depicting the main branches of the corresponding mindmap:
Post-exploit.png