Windows
Windows AD Attacks and Windows PrivEsc
Overview
Obtain Credentials to get foothold
On the host machine, escalate our privileges via exploits
On the host machine, enumerate accounts
On the host machine, dump credentials
Using those credentials, attempt to laterally moves
Establish persistence on those machines
Repeat steps 1 to 6
Last updated