When performing post-exploitation, there are a number of techniques that you will need to be aware of. These techniques are what you will leverage when you are engaged in a penetration test. For example, consider a scenario where you might compromise a standard user who doesn't have access to many resources on a network. Your goal (as defined in the scope of the penetration test) is to obtain domain dominance and create a high privileged user account. How would you progress? This is where understanding the different techniques of post-exploitation comes in, as you will be able to see gaps that can be leveraged to bring you closer to your goal.
We will cover some of these techniques in this section.