cheatsheet
CtrlK
  • Introduction
  • Internal Pentest
    • Active Directory
      • Reconnaissance
      • Exploitation
      • Post-Exploitation
        • Extracting Credentials
          • Retrieve Windows passwords
          • Retrieve Windows hashes
        • Maintening Access
        • Lateral Movement
Powered by GitBook
On this page
  1. Internal Pentest
  2. Active Directory
  3. Post-Exploitation

Extracting Credentials

Retrieve Windows passwordsRetrieve Windows hashes
PreviousPost-ExploitationNextRetrieve Windows passwords

Last updated 6 years ago