$29
Post Exploitation: Performing Infrastructure Analysis -
Everything that comes after the shell during a penetration test is ...
Data exfiltration (Data extrusion)
The unauthorized transfer of data from a computer.
This tag is listed under
Data & Information Management
and IT Security & Architecture
Community