Post Exploitation

From The Penetration Testing Execution Standard
Revision as of 11:37, 2 March 2011 by Iamit (talk | contribs) (Created page with "This section details the post-exploitation elements that should be addressed in a penetration test.<br /> Following is an image depicting the main branches of the corresponding m...")
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search
The printable version is no longer supported and may have rendering errors. Please update your browser bookmarks and please use the default browser print function instead.

This section details the post-exploitation elements that should be addressed in a penetration test.
Following is an image depicting the main branches of the corresponding mindmap:
Post-exploit.png