The Evolution Exchange Cyber Security Podcast cover image

Evo Cyber Security #41 - The Art of Penetration Testing - Techniques, Tools, and Best Practices

The Evolution Exchange Cyber Security Podcast

00:00

What Are Some Best Practices Around Post Exploitation?

The right answer is not just to stop. A lot of people just stop once they've got domain admin, but you also know what I've heard it called punch the punch the client in the face,. Like show off how what you've done or caused the problems. Show them things are obvious. What does work well for post exploitation to give that client clients an extra value beyond just yeah, I was able to get DA? That doesn't really necessarily mean that you check the part that mattered most.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app