Post-Exploitation

Post-exploitation covers privilege escalation, lateral movement, persistence mechanisms, and techniques to achieve domain dominance in Active Directory environments.

Warning

Post-exploitation requires careful documentation and coordination with the client. Track all credentials harvested, persistence installed, and systems accessed.

Post-Exploitation Topics

Lateral Movement Overview

Once you have credentials or elevated privileges, lateral movement allows you to pivot through the network toward high-value targets.

Technique Requirements Tool Detection
Pass-the-Hash NTLM Hash Mimikatz, CrackMapExec Medium
Pass-the-Ticket Kerberos Ticket Rubeus, Mimikatz Low
Overpass-the-Hash NTLM Hash Rubeus, Mimikatz Low
PsExec Admin Creds + SMB Impacket, Sysinternals High
WMI/WinRM Admin Creds CrackMapExec, Evil-WinRM Medium
RDP Valid Creds + RDP Access xfreerdp, rdesktop Medium