0%

Action on Objectives

What is Action on Objectives?

Action on Objectives is the final phase where the attacker achieves their ultimate goals, which could include data theft, system damage, privilege escalation, or other malicious activities. In ethical hacking, this phase demonstrates what an attacker could accomplish after breaching defenses.

Common Objectives

Data Exfiltration

Stealing sensitive data from the compromised system.

Privilege Escalation

Gaining higher-level privileges on the system.

Lateral Movement

Moving through the network to access other systems.

Destructive Actions

Deleting data, encrypting files (ransomware), or disrupting services.

Common Techniques

  • Data harvesting and exfiltration
  • Privilege escalation to gain admin/root access
  • Lateral movement through the network
  • Installing ransomware or other malware
  • Defacing websites or altering system configurations
  • Creating backdoors for future access

Popular Tools

Mimikatz

Tool for extracting plaintext passwords, hashes, and Kerberos tickets.

BloodHound

For analyzing Active Directory environments and identifying attack paths.

Rubeus

Tool for Kerberos abuse and golden ticket attacks.

Empire

Post-exploitation framework with extensive capabilities.

Ethical Considerations

This phase must be conducted with extreme caution in ethical hacking. Only perform actions that are explicitly authorized. Data exfiltration should be simulated rather than actual, and destructive actions should never be performed without explicit permission. Document all potential impacts that could result from the vulnerabilities discovered.

Action on Objectives Phase