← Back to Glossary

Post-Exploitation

Activities performed after gaining initial access to a system, including privilege escalation, persistence establishment, lateral movement, and data exfiltration.

Learn More

📚 Penetration Testing Hub

Related Terms