Skip to Content
The Ultimate Kali Linux Book - Third Edition
book

The Ultimate Kali Linux Book - Third Edition

by Glen D. Singh
April 2024
Intermediate to advanced content levelIntermediate to advanced
828 pages
21h 34m
English
Packt Publishing
Content preview from The Ultimate Kali Linux Book - Third Edition

10

Post-Exploitation Techniques

During the exploitation phase of the Cyber Kill Chain, ethical hackers and penetration testers focus on taking advantage of potential security vulnerabilities that were identified during the reconnaissance phase with the intent to determine whether the security vulnerability exists on the targeted system or not. However, while the exploitation phase may seem like a victory for aspiring ethical hackers, keep in mind that the objective is to discover known and hidden security flaws that may exist on the organization’s assets.

After exploiting a targeted system or network, performing post-exploitation techniques enables penetration testers to gather sensitive information such as users’ log-on credentials and password ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

The Ultimate Kali Linux Book - Second Edition

The Ultimate Kali Linux Book - Second Edition

Glen D. Singh

Publisher Resources

ISBN: 9781835085806Supplemental Content