# Post Exploitation

## [Privilege Escalation](https://book.turbosec.net/post-exploitation/privilege-escalation)

## [Cracking hashes](https://book.turbosec.net/post-exploitation/privilege-escalation/hashing-and-cracking)

## Persistence

## [Exfiltration](https://book.turbosec.net/post-exploitation/data-exfiltration)
