Navigation : Administration Recon Malware Exploitation Post-Exploitation - Linux - Password cracking - Windows -- C2 -- Credentials Collection -- Defense Evasion -- Execution -- Information Gathering -- Lateral Movement Windows C2 Credentials Collection KeePass System Wi-Fi Profiles Defense Evasion AV Exclusions Command Obfuscation Execution Information Gathering GPO Lateral Movement