Post-Exploitation Techniques

Post-exploitation techniques represent the category of offensive security actions taken after an attacker — or authorized penetration tester — has achieved initial access to a target system. This page covers the definition and operational scope of post-exploitation as a structured phase of adversarial engagement, the technical mechanics that define it, the classification boundaries that separate its sub-disciplines, and the regulatory frameworks that govern its authorized use. The subject is directly relevant to practitioners navigating penetration testing providers and to security researchers benchmarking assessment depth against established standards.


Definition and scope

Post-exploitation is the operational phase of a penetration test or adversarial simulation that begins upon confirmed, authenticated access to a target system and continues until the engagement's defined objectives are met or the rules of engagement require termination. It is formally distinct from initial access — the phase concerned with bypassing perimeter controls — and from reconnaissance, which precedes any active interaction with target infrastructure.

NIST SP 800-115, Technical Guide to Information Security Testing and Assessment frames penetration testing as a multi-phase discipline in which exploitation findings must be followed by post-exploitation analysis to determine actual business impact. Without post-exploitation activity, a test confirms only that a vulnerability exists — not that it is consequential. This distinction is operationally significant under compliance frameworks such as PCI DSS v4.0, Requirement 11.4, which mandates that penetration testing demonstrate the potential for unauthorized access to cardholder data, not merely the existence of a technical flaw.

The scope of post-exploitation encompasses 6 primary operational objectives: persistence establishment, privilege escalation, lateral movement, credential harvesting, data exfiltration simulation, and impact assessment. Each objective maps to a distinct phase of the MITRE ATT&CK framework, which documents adversary tactics across 14 tactic categories as of the ATT&CK Enterprise matrix (MITRE ATT&CK).


Core mechanics or structure

Post-exploitation mechanics operate across a structured sequence of actions, each building on the access level achieved in the preceding step.

Persistence involves the installation of mechanisms that survive system reboots or session terminations. Common persistence methods documented in MITRE ATT&CK include scheduled task manipulation (T1053), registry run key modification (T1547.001), and service installation (T1543). Persistence mechanisms directly inform incident response planning by revealing attacker dwell time potential.

Privilege escalation seeks to elevate access from a standard user account to an administrative or SYSTEM-level context. The two primary escalation paths are local privilege escalation — exploiting misconfigured services, unpatched kernel vulnerabilities, or weak file permissions on the compromised host — and domain privilege escalation, which targets Active Provider Network misconfigurations. Techniques such as Kerberoasting (T1558.003) and pass-the-hash (T1550.002) fall under this category and are catalogued in the MITRE ATT&CK Credential Access tactic.

Lateral movement describes the process of traversing a network from the initial foothold to additional hosts or network segments. Remote service exploitation, stolen credential reuse, and abuse of administrative protocols such as SMB and WMI are standard vectors. MITRE ATT&CK documents lateral movement under tactic TA0008, with 9 technique families in the Enterprise matrix.

Credential harvesting consolidates authentication material — password hashes, Kerberos tickets, plaintext credentials from memory — to support both lateral movement and exfiltration. Tools such as Mimikatz are publicly documented in adversary playbooks and referenced in advisories from the Cybersecurity and Infrastructure Security Agency (CISA).

Data exfiltration simulation tests whether harvested data can be transmitted out of the target environment without triggering detection controls. Authorized tests simulate this phase without removing live data, substituting synthetic markers to measure data loss prevention (DLP) control efficacy.

Impact assessment documents what a real adversary could achieve at maximum access — ransomware deployment simulation, critical system disruption, or regulatory data exposure — providing the business-risk translation required by frameworks such as NIST Cybersecurity Framework (CSF) 2.0.


Causal relationships or drivers

Post-exploitation has become a mandatory component of mature penetration testing programs for 3 converging reasons.

First, compliance frameworks have evolved beyond perimeter-centric testing. PCI DSS v4.0 and HIPAA's Security Rule (45 CFR § 164.308(a)(8)) require that evaluations assess the effectiveness of access controls — not just their existence. A test that stops at initial access cannot satisfy this requirement.

Second, adversary behavior documented in CISA advisories and FBI threat intelligence consistently shows that the most damaging breaches involve extended dwell times averaging 16 days (as measured in the Mandiant M-Trends 2023 Report) during which post-exploitation activity occurs undetected. Testing programs that omit this phase leave that attack surface unvalidated.

Third, FedRAMP authorization requirements under the FedRAMP Penetration Test Guidance explicitly require that cloud service providers demonstrate post-exploitation impact analysis as part of the annual assessment cycle, linking the technical discipline directly to federal authorization decisions.

For organizations navigating the broader regulatory landscape, the provider network purpose and scope page describes how post-exploitation testing fits within the full spectrum of authorized assessment services.


Classification boundaries

Post-exploitation techniques are classified along 3 primary axes: target domain, technique sophistication, and authorization tier.

Target domain distinguishes between host-based post-exploitation (local privilege escalation, file system access, process injection), network-based post-exploitation (lateral movement, traffic interception), and identity-based post-exploitation (Active Provider Network attacks, OAuth token abuse, cloud IAM exploitation). Cloud-specific post-exploitation has emerged as a discrete sub-domain, with techniques targeting AWS IAM role chaining, Azure Managed Identity abuse, and GCP service account impersonation documented in MITRE ATT&CK for Cloud (IaaS).

Technique sophistication is stratified by the level of detection evasion required. Tier-1 techniques operate against unpatched, default-configured systems using publicly documented exploits. Tier-2 techniques require custom tooling or living-off-the-land (LotL) approaches that abuse native operating system utilities to evade signature-based detection. Tier-3 techniques involve full adversary emulation with custom implants, encrypted command-and-control channels, and active defense evasion — the domain of red team operations rather than standard penetration tests.

Authorization tier reflects the legal and contractual boundaries governing what post-exploitation activity is permitted. Scope limitations, data handling restrictions, and prohibited targets are formalized in Rules of Engagement (RoE) documents. Unauthorized post-exploitation — even if technically identical to authorized testing — constitutes a violation under 18 U.S.C. § 1030 (the Computer Fraud and Abuse Act).


Tradeoffs and tensions

Post-exploitation presents practitioners and program owners with genuine operational tensions that resist simple resolution.

Depth versus operational risk is the central tension. The most realistic post-exploitation activity — deploying persistence mechanisms, exfiltrating synthetic data, or simulating ransomware staging — carries real risk of unintended system disruption or data corruption. Production environments with uptime requirements often constrain the depth of authorized testing, limiting the fidelity of results. NIST SP 800-115 acknowledges this tension by recommending that testers prioritize non-destructive techniques wherever impact equivalence can be demonstrated.

Detection evasion versus remediation value creates a secondary conflict. Post-exploitation techniques designed to evade endpoint detection and response (EDR) tools produce more realistic adversary simulation but may generate no forensic artifacts — reducing the remediation intelligence available to the defending team. Tests that succeed without any detection alert validate attacker capability but provide limited guidance for control improvement.

Scope creep risk is structurally higher in post-exploitation than in reconnaissance or initial access phases, because lateral movement by definition extends access beyond the originally compromised host. A practitioner who discovers an unscoped adjacent system during lateral movement faces an ethical and legal decision point that must be addressed in pre-engagement documentation.

Red team versus penetration test framing affects client expectations. Full post-exploitation campaigns, including persistence and command-and-control infrastructure, are characteristic of red team operations — not standard penetration tests. Conflating the two leads to underscoped tests or over-scoped red team proposals. The distinction is addressed in the PTES (Penetration Testing Execution Standard) and in CREST's published assessment frameworks (CREST International).


Common misconceptions

Misconception: Post-exploitation is optional for compliance testing.
Correction: PCI DSS v4.0 Requirement 11.4.1 and HIPAA's technical safeguard evaluation requirements both reference the need to assess whether controls prevent unauthorized access to sensitive data — an objective that cannot be met without post-exploitation activity demonstrating access chain viability.

Misconception: Automated tools fully replicate manual post-exploitation.
Correction: Frameworks such as Metasploit automate specific post-exploitation modules, but adversary simulation at the sophistication level described in CISA Red Team and Blue Team Operations advisories requires manual technique chaining, context-specific decision-making, and custom tooling that automated platforms do not replicate.

Misconception: Achieving SYSTEM or root access is the endpoint of a test.
Correction: Maximum privilege on a single host is a waypoint, not an objective. The objective is demonstrating business impact — whether that means reaching a payment card database, extracting Active Provider Network credentials, or accessing protected health information. NIST SP 800-115 frames impact demonstration as the required deliverable, not privilege achievement.

Misconception: Post-exploitation findings are only relevant to technical teams.
Correction: Post-exploitation reports inform board-level risk decisions, cyber insurance underwriting, and regulatory audit responses. The NIST Cybersecurity Framework 2.0 Govern function explicitly connects technical assessment findings to organizational risk governance.


Checklist or steps (non-advisory)

The following sequence reflects the standard post-exploitation phase structure as documented in NIST SP 800-115, the PTES, and MITRE ATT&CK tactic ordering.

Phase 1 — Access Confirmation
- Verify shell type (interactive, non-interactive, meterpreter, web shell)
- Identify operating system version, patch level, and installed security tooling
- Confirm network connectivity and egress paths
- Document authorization scope against Rules of Engagement

Phase 2 — Local Enumeration
- Enumerate local users, groups, and privilege levels
- Identify running processes, scheduled tasks, and installed services
- Locate sensitive files, configuration files, and credential stores
- Map writable directories and misconfigured permissions

Phase 3 — Privilege Escalation
- Test for unpatched local privilege escalation vulnerabilities (CVE database cross-reference)
- Assess service misconfigurations, DLL hijacking opportunities, and token impersonation paths
- Attempt domain privilege escalation if within scope (Kerberoasting, AS-REP roasting, DCSync)

Phase 4 — Credential Harvesting
- Extract NTLM hashes from SAM/NTDS.dit where authorized
- Dump LSASS memory for plaintext credentials and Kerberos tickets
- Search for hardcoded credentials in scripts, configuration files, and environment variables

Phase 5 — Lateral Movement
- Attempt authenticated access to adjacent systems using harvested credentials
- Test network segmentation controls between scoped zones
- Document reachable hosts and services outside original foothold

Phase 6 — Persistence (if authorized)
- Install persistence mechanism matching scope authorization
- Verify persistence survives simulated reboot or session termination
- Document installation method and removal procedure

Phase 7 — Impact Demonstration
- Reach defined objective hosts (database servers, domain controllers, data repositories)
- Document data access scope without extracting live sensitive data
- Capture evidence chain supporting business-risk translation in final report

Phase 8 — Cleanup and Documentation
- Remove all installed artifacts, accounts, and persistence mechanisms
- Restore any modified configurations to original state
- Deliver timestamped evidence log to client in accordance with RoE


Reference table or matrix

Post-Exploitation Category MITRE ATT&CK Tactic Primary Technique Examples Compliance Relevance
Persistence TA0003 Scheduled Tasks (T1053), Registry Run Keys (T1547.001) PCI DSS v4.0 Req. 11.4; FedRAMP PT Guidance
Privilege Escalation TA0004 Sudo Abuse (T1548.003), DLL Hijacking (T1574.001) NIST SP 800-115; HIPAA 45 CFR § 164.308(a)(8)
Credential Access TA0006 Kerberoasting (T1558.003), LSASS Dump (T1003.001) PCI DSS v4.0 Req. 8; CISA Advisory AA22-110A
Lateral Movement TA0008 Pass-the-Hash (T1550.002), SMB/WMI Abuse (T1021) NIST CSF 2.0 Protect/Detect Functions
Collection TA0009 Local File Discovery (T1083), Clipboard Data (T1115) HIPAA PHI access controls; CMMC Level 2
Exfiltration (simulated) TA0010 Exfil Over C2 Channel (T1041), Exfil via Web Service (T1567) PCI DSS v4.0 Req. 11.4; FedRAMP PT Guidance
Impact Assessment TA0040 Data Encrypted for Impact (T1486 — simulation only) NIST SP 800-115 §4.4; CISA Red Team Guidance
Cloud Post-Exploitation TA0040 / Cloud Matrix IAM Role Chaining, Managed Identity Abuse FedRAMP; NIST SP 800-145

Practitioners selecting assessment scope can cross-reference the above matrix against the engagement types described in the how to use this penetration testing resource page.


 ·   · 

References