
上QQ阅读APP看书,第一时间看更新
Gaining access
This is the exploitation phase where the penetration tester attempts to compromise a target system or network. During this phase, the penetration may create a custom payload to execute either remotely or on the actual target.
This phase has two objectives:
- Gain access
- Escalate privileges