Answer:
Attackers use scripts to automate tasks such as privilege escalation, lateral movement, and data exfiltration during post-exploitation.
Attackers use scripts to automate tasks such as privilege escalation, lateral movement, and data exfiltration during post-exploitation.
You may be interested in:
Web Security MCQs