Exploitation
In the exploitation phase, we use vulnerabilities found and CVEs associated with the target to gain unauthorized access or control. It involves access to sensitive data or executing malicious code.

Exploitation can also create the possibility of jumping to another machine in the same network via pivoting or even jumping to another network.
To be cautious, some security measures that can be applied to avoid any exploitation or privilege escalation attempt are:
Account permission management
Strong password policies
Implementation of database security
Well-development practices
Cybersecurity awareness training
Last updated