Wrapping up the chapter, we learned about different standards of pentesting followed across the industry, and we went through the seven phases of the PTES standard in detail. We also looked at red-teaming and how it is different from pentesting.
In the next chapter, we will look at a few of the latest post-exploitation tools and examine in detail how they work.