postexploitation
Postexploitation is the phase of a cyber intrusion that begins after an initial foothold has been established on a target system. During this stage, an attacker or tester seeks to maintain access, elevate privileges, and move deeper into the network while minimizing disruption and avoiding detection.
Common goals include persistence (keeping access through reboots or stealthy footholds), privilege escalation, discovery of other
In legitimate contexts such as penetration testing and red teaming, postexploitation is simulated under authorization to
Defenders focus on detecting and mitigating postexploitation through endpoint detection and response, network monitoring, and rigorous