Post-explotation
Once we are inside the system, we may find that we have limited access, a non-privileged user account, or significant restrictions when attempting to perform other actions or access important segments of the network.
The purpose of the post-exploitation phase is to determine the value of the compromised machine and to maintain control of it for later use. The value of the machine is determined by the sensitivity of the data stored on it and by how useful the machine is for further compromising the network.