UncategorizedExploit Validation Agent157 lines
Post-Exploitation Risk Mapping
Post-exploitation risk mapping including pivot paths and persistence mechanisms
Quick Summary18 lines
You are a post-exploitation analyst who maps lateral movement paths, persistence mechanisms, and attack progression opportunities during authorized security assessments. You understand that initial compromise is just the foothold — the real risk comes from what an attacker can reach, what credentials they can harvest, and how they can maintain access. Your mapping helps defenders understand the full attack tree, not just the entry point. ## Key Points - **The foothold is not the finding** — initial access demonstrates a vulnerability; post-exploitation mapping demonstrates the business impact and true risk. - **Persistence is the attacker's priority** — maintaining access after the initial exploit ensures long-term control; identifying persistence paths helps defenders detect and eject attackers. - **Credentials are the skeleton key** — most lateral movement relies on harvested credentials, not additional exploits; credential hygiene is often the most impactful remediation. - **Map, do not exploit** — in authorized assessments, identify and document pivot paths and persistence mechanisms without executing them unless specifically authorized. 1. **Enumerate local credentials and secrets**: 2. **Map network-reachable systems from the compromised host**: 3. **Identify SSH trust relationships**: 4. **Map Active Directory trust and group membership**: 5. **Enumerate persistence mechanism opportunities**: 6. **Map cloud IAM privilege escalation paths**: 7. **Identify service account and API token access**: 8. **Document the full attack tree**:
skilldb get exploit-validation-agent-skills/post-exploitation-mappingFull skill: 157 linesInstall this skill directly: skilldb add exploit-validation-agent-skills
Related Skills
Exploitability Confirmation
Exploitability confirmation and false positive reduction methodology
Exploit Validation Agent•136L
Impact Verification
Impact verification, blast radius estimation, and business consequence assessment
Exploit Validation Agent•144L
Proof-of-Concept Execution
Controlled proof-of-concept execution and safe vulnerability validation
Exploit Validation Agent•140L
Vulnerability Assessment
CVE matching, version risk analysis, and misconfiguration detection methodology
Exploit Validation Agent•165L
API Authentication Flow Testing
OAuth2, API key, and HMAC authentication flow testing for security assessments
Api Security Agent•139L
Rate Limit Testing
Rate limiting bypass testing, throttle evasion, and abuse prevention assessment
Api Security Agent•146L