⌨️
Penetration testing & ethical hacking concepts
Ctrl
k
Copy
Windows/Active Directory
Lateral movement & Pivoting
Abusing user behavior
Abusing writable shares
RDP hijacking
Previous
Pass-the-Key/Overpass-the-Hash (Kerberos)
Next
Abusing writable shares