A guide for Windows system enumeration and post-exploitation techniques.
Attacking Methods
Network
User
Requires one valid domain user:
Active Directory
Post-Exploitation
- Mimikatz:
Lateral Movement:
With Administrator credentials, use
psexec
to move laterally: Hash Format Requirement:
- Correct format:
[LM hash]:[NT hash]
- Example:
00000000000000000000000000000000:actualNTLMhashhere