02.THROUGH

This phase begins after successfully breaching the perimeter and focuses on actions taken inside the target environment. With a foothold now established, the objective shifts to moving laterally, escalating privileges, interacting with internal systems, and establishing persistence deeper in the network. This phase turns initial access into real influence and operational freedom within the environment.

Last updated