Exploitation
In the exploitation phase, we use vulnerabilities found and CVEs associated with the target to gain unauthorized access or control. It involves access to sensitive data or executing malicious code.

Exploitation can also let the possibility of jumping to another machine in the same network via pivoting or even jumping to another network.
To be cautious, some security measures that can be applied to avoid any attempt of exploitation or privilege escalation are:
Account permission management
Strong password policies
Implementation of database security
Well-development practices
Cybersecurity awareness training
Last updated