
On the left side, it's always web shells. You just drop a web shell. You have the persistence and execute commands even after patching or something like that if does not remove the web shell. On the right side, we get session keys. So, we use them to overtake existing sessions. Basically, we can then use those machines which are deployed in Citrix and we are already mostly in the active directory. Now post exploitation.