Robert is a black box penetration tester who conducted pen testing attacks on all of the network's application servers. He was able to exploit a vulnerability and gain access to the system using a mimikatz tool. Which of the following activities did he perform using mimikatz, and which task should he perform next?
a. Robert used mimikatz for tailgating, and should perform phishing next.
b. Robert used mimikatz for phishing, and should perform lateral movement next.
c. Robert used mimikatz for footprinting, and should install a backdoor next.
d. Robert used mimikatz for credential harvesting, and should perform privilege escalation using a high-privileged account next.