Post-exploitation can be performed in many different ways. Sometimes, using just one tool, such as the Responder, can lead to you capturing a high privileged hash. On other occasions, you need to really work through the environment by using various techniques. In this chapter, we focused on just a few tools, but there are many more available.
In this chapter, you identified the various techniques that can be utilized when performing post-exploitation. You can now build a basic AD lab, which can be used to test your skills in post-exploitation. You have the ability to use real-world tools that are used by penetration testers and attackers. You have also gained practical hands-on skills in regards to performing various post-exploitation attacks.
In the next chapter (Chapter 12, Maintaining Control within the Environment), we will discuss persistence and how to maintain access...