In the Cyber Security, Post Exploitation refers to the phase after exploiting a target system. Cyber Kill Chain is the progressive steps in which an attacker performs an attack on a target system. An attacker starts with reconnaissance, then builds an exploit payload and delivers it to the target through email, file sharing etc. The payload is executed and the target is exploited. Post exploitation, the attacker proceeds towards achieving the objective of the attack. In MITRE Attack, Exploitation is referred as Execution.