上QQ阅读APP看书,第一时间看更新
Exploitation
In the exploitation phase, you start focusing on obtaining access to systems and evading any security blockers that exist. By performing a vulnerability analysis in the exploitation phase, you can create a precise plan that you can execute.
In this phase, you will begin to work with many tools. Some exploits can be done easily, while others can be complex.