post-exploitation
Post-exploitation refers to the activities performed by an attacker or security professional after successfully compromising a system or network, with the goal of maintaining access, gathering sensitive information, or further exploiting the compromised environment.
Requires login.
Related Concepts (16)
- command and control
- cryptography
- data exfiltration
- evasion techniques
- exploit development
- forensic analysis
- lateral movement
- malware analysis
- metasploit framework
- network reconnaissance
- password cracking
- persistence
- privilege escalation
- reverse engineering
- security misconfigurations
- social engineering
Similar Concepts
- api exploitation
- backdoor exploitation
- code exploitation
- exploit
- exploit campaigns
- exploit utilization
- exploitation
- exploitation of vulnerabilities
- exploitation techniques
- exploitative tactics
- exploits
- heap exploitation
- return-oriented exploitation
- return-oriented exploitation techniques
- vulnerability exploitation