if a penetration tester has gained access to a network and then tries to move around inside the network to other resources, what procedure is the tester performing?