cheatsheet
search
Ctrlk
  • Introduction
  • Internal Pentest
    • Active Directorychevron-right
      • Reconnaissancechevron-right
      • Exploitationchevron-right
      • Post-Exploitationchevron-right
        • Extracting Credentialschevron-right
          • Retrieve Windows passwords
          • Retrieve Windows hashes
        • Maintening Accesschevron-right
        • Lateral Movementchevron-right
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Internal Pentestchevron-right
  2. Active Directorychevron-right
  3. Post-Exploitation

Extracting Credentials

Retrieve Windows passwordschevron-rightRetrieve Windows hasheschevron-right
PreviousPost-Exploitationchevron-leftNextRetrieve Windows passwordschevron-right

Last updated 6 years ago