Once you have gained access, you perform additional activities: privilege escalation, lateral movement, data exfiltration, persistence establishment, or whatever the Rules of Engagement permit.