cheatsheet
Ctrlk
  • Introduction
  • Internal Pentest
    • Active Directory
      • Reconnaissance
      • Exploitation
      • Post-Exploitation
        • Extracting Credentials
        • Maintening Access
        • Lateral Movement
          • SMB protocol
Powered by GitBook
On this page
  1. Internal Pentest
  2. Active Directory
  3. Post-Exploitation

Lateral Movement

SMB protocol
PreviousAdding Local AdministratorNextSMB protocol

Last updated 6 years ago