Post Compromise Enumeration

Once we have compromised and gained an initial access, we will see how we can proceed further with Post-Compromise Enumeration to gather even more information on the network