AD Attack Part 3: Post-Exploitation