Anomaly 37 - Trivia 09
In a penetration testing scenario, what is the primary objective of post-exploitation activities after gaining initial access to a target system?
a) Deleting system logs to cover tracks - Not something we should do in a pentest we dont want to destory our customers network
b) Extracting sensitive data from the compromised system
c) Installing backdoors for persistent access - Not really needed in a pentest
d) Patching vulnerabilities to secure the system - That is not our job we need to find vulns
Last modified: 28 May 2024