- Learn Penetration Testing
- Rishalin Pillay
- 63字
- 2021-06-24 14:09:09
Exploitation
In the exploitation phase, you start focusing on obtaining access to systems and evading any security blockers that exist. By performing a vulnerability analysis in the exploitation phase, you can create a precise plan that you can execute.
In this phase, you will begin to work with many tools. Some exploits can be done easily, while others can be complex.