With the ending of the last article, we have successfully exploited a system, now what?
As a pentester, when you’ll share vulnerability with the organization, you’ll have to show them the impact. This article is about creating that level of impact. Before you start, now we have our telegram bot…