⌨️
Penetration testing & ethical hacking concepts
Ctrl
K
Copy
Windows Active Directory
Lateral movement & Pivoting
Example scenario
Spawning remote processes
Windows Management Instrumentation (WMI)
Previous
Cypher
Next
Example scenario