Post-Exploitation begins once initial access has been obtained and focuses on consolidating control, escalating privileges, and deepening understanding of the compromised system.

The primary objective of this phase is privilege escalation, both on Linux and Windows, transforming limited access into administrative or root-level control while maintaining operational security.


This section contains distilled notes from my Hack The Box – Pentesting Path study.

Full repository (expanded notes, diagrams, screenshots): https://github.com/lameiro0x/pentesting-path-htb