Once the PenTest-er has gained access to the targets, the next step is to establish persistence. This means setting up a way to quickly and easily reconnect to the system later if needed. This could involve installing a backdoor, adding a user account with the right credentials, or using other techniques.

These methods allow the PenTest-er to move through the network, maintain access across multiple machines, and safely exfiltrate data without being detected. After completing the engagement, the PenTest-er will remove any traces of their activity to clean up the systems.

<aside> <img src="/icons/target_red.svg" alt="/icons/target_red.svg" width="40px" />

Mission Objectives


1. Establish and Maintain Persistence

Gaining access is difficult; keeping it shouldn't be. Persistence ensures that if a system reboots or a user logs off, the tester doesn't lose their shell.

2. Move Laterally through Environments

Once a single host is compromised, the tester "pivots" to other systems to find the organization's "Crown Jewels."

3. Staging and Exfiltration

This is where the "Impact" is proven. It simulates a data breach by preparing and removing sensitive information.