In doing so, we will again run through several phases:

  1. Pivoting
  2. Evasive Testing
  3. Information Gathering
  4. Vulnerability Assessment
  5. (Privilege) Exploitation
  6. Post-Exploitation

Pivoting

Evasive Testing

Information Gathering