Revision as of 11:37, 2 March 2011 by Iamit(talk | contribs)(Created page with "This section details the post-exploitation elements that should be addressed in a penetration test.<br /> Following is an image depicting the main branches of the corresponding m...")
This section details the post-exploitation elements that should be addressed in a penetration test.
Following is an image depicting the main branches of the corresponding mindmap: