Navigation : Administration Recon Malware Exploitation Post-Exploitation - Linux - Password cracking - Windows -- C2 -- Credentials Collection -- Defense Evasion --- AV Exclusions --- Command Obfuscation -- Execution -- Information Gathering -- Lateral Movement Defense Evasion AV Exclusions Command Obfuscation