Gaining access

This is the exploitation phase where the penetration tester attempts to compromise a target system or network. During this phase, the penetration may create a custom payload to execute either remotely or on the actual target.

This phase has two objectives:

  • Gain access
  • Escalate privileges