Windows

Windows AD Attacks and Windows PrivEsc

Overview

  1. Obtain Credentials to get foothold

  2. On the host machine, escalate our privileges via exploits

  3. On the host machine, enumerate accounts

  4. On the host machine, dump credentials

  5. Using those credentials, attempt to laterally moves

  6. Establish persistence on those machines

  7. Repeat steps 1 to 6

Last updated