In this chapter, you will learn about

•   Completing various exercises using post-exploitation tools

•   Performing lateral movement attacks like pass the hash

•   Investigative techniques to move laterally over the network

•   Discovering ways to maintain persistence and avoid detection

•   Exploring post-exploitation techniques for privilege escalation and enumeration

So far in this book, we have covered different ways to exploit network, application, and human vulnerabilities to gain access. In this chapter, we will investigate attack techniques that you can use once you have an initial foothold into a system. These are called post-exploitation techniques. There are an abundance of post-exploitation techniques ...

Get CompTIA PenTest+ Certification All-in-One Exam Guide, Second Edition (Exam PT0-002), 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.