Post-Exploitation
After gaining initial access, assess the true impact by exploring what an attacker could achieve: data access, privilege escalation, lateral movement, and persistence.
🎯 Why Post-Exploitation Matters
⚠️ Critical: Always stay within scope. Document everything. Never access real customer data or make permanent changes without explicit authorization.
📚 Post-Exploitation Guides
Explore in-depth guides for each post-exploitation technique. Each guide includes tools, techniques, and practical exercises for mastering the skill.
Session Attacks
AuthSession hijacking, cookie theft, JWT manipulation, token replay, session fixation, and OAuth/OIDC attack techniques.
Privilege Escalation
AccessVertical and horizontal privilege escalation, IDOR exploitation, role manipulation, parameter tampering, and access control bypass.
Lateral Movement
PivotingSSRF pivoting, cloud metadata exploitation, database pivoting, internal API discovery, Kubernetes escape, and network tunneling.
Cleanup & Documentation
ReportEvidence collection, artifact cleanup, client communication, professional documentation, and screenshot best practices.
Post-Exploitation Workflow
🛠️ Essential Post-Exploitation Tools
Stay Within Scope
✅ Quick Checklist
Ensure you've covered all post-exploitation categories:
- ☐ Cookie theft tested
- ☐ JWT manipulation
- ☐ Session fixation
- ☐ OAuth/OIDC tested
- ☐ Vertical escalation
- ☐ Horizontal escalation
- ☐ IDOR testing
- ☐ Role manipulation
- ☐ SSRF pivoting
- ☐ Cloud metadata
- ☐ Database pivoting
- ☐ Internal API discovery
- ☐ Test accounts removed
- ☐ Uploads deleted
- ☐ Evidence documented
- ☐ Client notified
Next Steps