Explotation
In the exploitation phase, we take advantage of the detected vulnerabilities to gain access to systems; to do so, we attempt to access the systems by exploiting the vulnerabilities identified in the previous phases.
This phase is the most difficult part of the process, since it is not always possible to exploit systems to gain access, and in some cases exploiting vulnerabilities may cause a denial of service. In any case, this is the phase in which we must think like a real attacker.