Сейчас ищут
Post Exploitation. Смотреть видео: The 3 Or 4 P S Of Post Exploitation Practical Exploitation Cyber Security Education, C2 Frameworks Post Exploitation With PowerShell Empire, Post Exploitation Transferring Files To Windows Targets, Close Encounters Of The Advanced Persistent Kind Leveraging Rootkits For Post Exploitation.