Navigation : Administration Recon Malware Exploitation Post-Exploitation - Linux - Password cracking - Windows -- C2 -- Credentials Collection -- Defense Evasion -- Execution -- Information Gathering --- GPO -- Lateral Movement Information Gathering Collect all kind of system information from a compromised Windows system. GPO