Post Exploitaion Phase
Post-Exploitation is a phase that occurs after the Maintaining Access phase, where the attacker
uses the established
access to achieve their goals.
Hackers Real Intentions
- Stealing sensitive data.
- Disrupting the system.
- Installing malware or backdoor.
- Gaining access to sensitive areas of the system
- Establishing a C2 channel
Methods used
- Data Exfiltration
- Privilege Escalation
- Lateral Movement
- Command and Control (C2)
- Malware installation
- Vulnerability exploitation
Comming soon!!!!!!!!!!!