Post-exploitation is the stage where the goal is to determine the criticality of the compromise and then maintain access for future use. This phase must always follow the rules of engagement that protect the client and protect ourselves (covering the tracks as per the requirements of the activity).