62 - Cyber Kill Chain - Post Exploitation - Actions on Objectives

The attacker establishes persistent presence on the system, most often installing a backdoor.