In this chapter, we focused on post exploitation tasks, which involved what can be done after we have broken into a target system. We covered basic filesystem commands and illustrated how to access a victim's machine, even if the user is not using a particular software or has powered off the system. We implemented both simple and advanced methods to maintain access to a system. Then, we looked at how to obtain user credentials after performing a keylogging attack on a target device. Later, we went over the concept of pivoting, which means targeting a system that is not directly present on our network. We even studied examples of pivoting autoroutes.
In the next few chapters, we will cover the fundamentals of website penetration testing.