RTO
search
Ctrlk
  • Getting Startedchevron-right
  • Command & Controlchevron-right
  • External Reconnaissancechevron-right
  • Initial Compromisechevron-right
  • Host Reconnaissancechevron-right
  • Host Persistencechevron-right
  • Host Privilege Escalationchevron-right
  • Elevated Host Persistencechevron-right
  • Credential Theftchevron-right
  • Password Cracking Tips & Trickschevron-right
  • Domain Reconnaissancechevron-right
  • User Impersonationchevron-right
  • Lateral Movementchevron-right
    • Lateral Movement
    • Windows Remote Management
    • PsExec
    • Windows Management Instrumentation (WMI)
    • The Curious Case of CoInitializeSecurity
    • DCOM
  • Session Passingchevron-right
  • Pivotingchevron-right
  • Data Protection APIchevron-right
  • Kerberoschevron-right
  • Active Directory Certificate Serviceschevron-right
  • Group Policychevron-right
  • MS SQL Serverschevron-right
  • Domain Dominancechevron-right
  • Forest & Domain Trustschevron-right
  • Local Administrator Password Solutionchevron-right
  • Microsoft Defender Antiviruschevron-right
  • Application Whitelistingchevron-right
  • Data Hunting & Exfiltrationchevron-right
  • Extending Cobalt Strikechevron-right
gitbookPowered by GitBook
block-quoteOn this pagechevron-down

Lateral Movement

Lateral Movementchevron-rightWindows Remote Managementchevron-rightPsExecchevron-rightWindows Management Instrumentation (WMI)chevron-rightThe Curious Case of CoInitializeSecuritychevron-rightDCOMchevron-right
PreviousProcess Injectionchevron-leftNextLateral Movementchevron-right

Last updated 2 years ago