![Learn Penetration Testing](https://wfqqreader-1252317822.image.myqcloud.com/cover/577/36698577/b_36698577.jpg)
上QQ阅读APP看书,第一时间看更新
Exploitation
In the exploitation phase, you start focusing on obtaining access to systems and evading any security blockers that exist. By performing a vulnerability analysis in the exploitation phase, you can create a precise plan that you can execute.
In this phase, you will begin to work with many tools. Some exploits can be done easily, while others can be complex.