⌨️
Penetration testing & ethical hacking concepts
Ctrl
K
Copy
Windows Active Directory
Lateral movement & Pivoting
Example scenario
Spawning remote processes
Windows Management Instrumentation (WMI)
Leveraging alternate authentication materials
Abusing user behavior
Previous
Icon mapping
Next
Example scenario