Part 3: Post-Exploitation
In this section, we will explore the phases of attack after the initial foothold in an organization. We will discuss conducting recon from that unique viewpoint to discover new hosts, lateral movement with the details we already have, and compromising accounts with higher privileges to allow for even more movement into the network. We wrap up with a discussion on maintaining access to our compromised resources.
This part of the book comprises the following chapters:
- Chapter 15, Going Beyond the Foothold
- Chapter 16, Escalating Privileges
- Chapter 17, Maintaining Access