Post-Exploitation

The real deal, techniques and tactics to take advantage of an exploitated target.


Linux

Execution

Lateral Movement

Password cracking

Hashcat

John the Ripper

Wordlist

WPA-PSK

Windows

C2

Credentials Collection

KeePass

System

Wi-Fi Profiles

Defense Evasion

Execution

Information Gathering

GPO

Lateral Movement


Template for this sub-section: