After you have gained access to a machine you must loot it. This is useful in order to be able to pivot into other machine.
@@ -8,3 +8,5 @@ So after we have exploited a machine we want to use that machine to learn as muc
We can start getting an understanding of the network by taking a tcp-dump.
We also want to look for password that might be reused on other machines, and sensitive information found in databases. Information about the user might be interesting in order to use social engineering attacks against other users in the network.