Chapter 8

Performing Post-Exploitation Techniques

This chapter covers the following topics related to Objective 3.7 (Given a scenario, perform post-exploitation techniques.) of the CompTIA PenTest+ PT0-002 certification exam:

  • Creating a Foothold and Maintaining Persistence After Compromising a System

  • Understanding How to Perform Lateral Movement, Detection Avoidance, and Enumeration

During a penetration testing engagement, after you exploit a vulnerability and compromise a system, you may perform additional activities to move laterally and pivot through other processes, applications, or systems to demonstrate how they could be compromised and how information could be exfiltrated from the organization. You may also maintain persistence by creating ...

Get CompTIA PenTest+ PT0-002 Cert Guide, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.