post exploitation = everything after the first exploit, including lateral movement, escape and es...
Manipulate the network With Physical access: Coerce the network Overcome switched traffic is...