⌨️
Penetration testing & ethical hacking concepts
Ctrl
k
Copy
Windows/Active Directory
Lateral movement & Pivoting
Example scenario
Spawning remote processes
Windows Management Instrumentation (WMI)
Leveraging alternate authentication materials
Abusing user behavior
Previous
Icon mapping
Next
Example scenario