Actions on objectives — persistence, lateral movement, and exfiltration.
This section is currently being built out. Check back soon.
Post-exploitation covers everything that happens after initial access — stabilizing your foothold, escalating privileges, moving laterally, and achieving your objectives.