16B: Move Throughout the System Flashcards
3.7 Given a scenario, perform post-exploitation techniques. 5.3 Explain use cases of the following tools during the phases of a penetration test.
1
Q
The techniques performed after the initial attack, such as lateral movement and persistence.
A
post exploitation activities
2
Q
The process by which an attacker is able to move from one part of a computing environment to another.
A
lateral movement