Skip to content

9. Where To Go From There

Thibault edited this page Apr 20, 2021 · 2 revisions

Good job! You completed the penetration testing circle! 👏👏👏

We went from gathering information about our target, from a personal and technical point of view, to an analysis to determine the target's infrastructure and whether we could find openings or vulnerabilities to attack.

We then accessed the target by exploiting a vulnerability or by providing a payload that the target would execute, and then performed a post-exploitation with the payload we provided.

From stealing information with a keylogger to download files to their machine, as well as maintaining access to it.

The next step would be to put into practice all these things we've learned, using various vulnerable virtual machines that you can download online 😎

Next Page >