Summary
Throughout this chapter, we covered post exploitation in detail. We looked at post exploitation scenarios from basic to advanced. We also looked at privilege escalation in a Windows environment and couple of other advanced techniques.
In the next chapter, we will see how we can speed up the testing process and gain an advantage over manual techniques with Metasploit. We will cover automated approaches, which save time and money.