If successful, the pen testers establish the application is vulnerable to remaining hacked and doesn’t have enough safety features.Write-up-Exploitation: Review the final results of your exploitation phase and evaluate the probable influence of effective assaults. Doc the conclusions, such as the actions taken to take advantage of vulnerabilities