Hands-On Penetration Testing with Kali NetHunter
上QQ阅读APP看书,第一时间看更新

Gaining access

This is the exploitation phase where the penetration tester attempts to compromise a target system or network. During this phase, the penetration may create a custom payload to execute either remotely or on the actual target.

This phase has two objectives:

  • Gain access
  • Escalate privileges