The phase that occurs after exploitation. During post-exploitation, the data on the exploited machine is analyzed to determine the value and usefulness of the compromised host. Post-exploitation tasks include identifying configuration settings and mapping the network topology.
![]() |