⌨️
Penetration testing & ethical hacking concepts
Ctrl
K
Copy
Windows Active Directory
Lateral movement & Pivoting
Abusing user behavior
Abusing writable shares
RDP hijacking
Previous
Pass-the-Key/Overpass-the-Hash (Kerberos)
Next
Abusing writable shares