Purple Team
Published in

Purple Team

What you can do after you hacked a computer? (post-exploitation techniques part-1)

From: pluralsight.com

Post-exploitation covers everything that ought to be performed, following on from active target misuse. For instance, effective misuse may have been to gain physical access to the organization by tailgating. The post-exploitation undertaking might be to gather essential data and exfiltrate without being caught or noticed — it endeavors to expand and…

--

--

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store