In the Cyber Security, Post Exploitation refers to the phase after exploiting a target system. Cyber Kill Chain is the progressive steps in which an attacker performs an attack on a target system. An attacker starts with reconnaissance, then builds an exploit payload and delivers it to the target through email, file sharing etc. The…