Vulnerability Exploitation Techniques

Post exploitation involves securing ana elevating the control on target machine

Few post exploitation process/techniques to achieve above are mentioned below

  1. Uploading File/Tools
  2. Elevating privileges
  3. Installing backdoor
  4. Cleaning up evidence of attack
  5. Expand attack to additional network or system.

Keep visiting....for more...

Comments

Popular posts from this blog

Payment Gateway Security Testing Checklist

Network Security VAPT Checklist

How to dump Database using Sqlmap