#cybersecurity #hacking #penetration-testing Post Exploitation File Transfers Maintaining Access Pivoting Cleaning Up