Now that you have exploited the system, you may be wondering what's next. Post-exploitation is the next step and is where we want to gain further access to targets within the internal network. In this chapter, we will look at how we can obtain higher privileges than what we currently have. This might entail further sniffing across the network, along with performing lateral movement techniques.
In this chapter, you will learn about different post-exploitation techniques and why post-exploitation forms an integral part of a penetration test. You will learn how to build an AD lab that you can use to test your post-exploitation skills against. By using the tools that are available, you will understand their purposes and how they can be used in a penetration test so that you can ensure you have access to the exploited system.
As...