Navigation : Administration Recon Malware Exploitation Post-Exploitation - Linux - Password cracking - Windows Post-Exploitation The real deal, techniques and tactics to take advantage of an exploitated target. Linux Execution Lateral Movement Password cracking Hashcat John the Ripper Wordlist WPA-PSK Windows C2 Credentials Collection KeePass System Wi-Fi Profiles Defense Evasion AV Exclusions Command Obfuscation Execution Information Gathering GPO Lateral Movement