Exploitation is the last phase where a security tester actively exploits the security weaknesses present in the system under consideration. Once the attack is successful, it is possible to penetrate more systems in the domain, because the penetration testers then have the access to more potential targets that were not available before.
The types of exploitation are segregated into three different categories −
Attack Against WEB-SERVERS
Attack against NETWORKS
Attack against SERVICES