Skip to Content
The Ultimate Kali Linux Book - Second Edition
book

The Ultimate Kali Linux Book - Second Edition

by Glen D. Singh
February 2022
Intermediate to advanced content levelIntermediate to advanced
742 pages
15h 41m
English
Packt Publishing
Content preview from The Ultimate Kali Linux Book - Second Edition

Chapter 9: Advanced Network Penetration Testing — Post Exploitation

The exploitation phase of penetration testing focuses on gaining access to your target, such as a vulnerable host on a network. However, while the exploitation phase will seem like a victory, remember that as a penetration tester, your objective is to discover known and hidden security vulnerabilities within an organization's network and their assets. After exploiting a system or network, performing post-exploitation techniques will allow you to gather sensitive data such as users' login credentials and password hashes, impersonate high-privilege users on the network to gain access to other systems and servers, perform lateral movement to go deeper into restricted areas of the ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

The Ultimate Kali Linux Book - Third Edition

The Ultimate Kali Linux Book - Third Edition

Glen D. Singh

Publisher Resources

ISBN: 9781801818933