Post-Exploitation Data CollectionUnderstand how adversaries locate, stage, and exfiltrate sensitive data after gaining access to systems.