Introduction In the world of Windows network security, one of the most powerful and dangerous lateral movement techniques is the Pass-the-Hash (PtH) attack. Unlike traditional
During Red Team assessments, after an attacker has compromised a system, they often move laterally through the network, gaining more relevant information on other systems.
In this article, we explore how a WebClient Workstation Takeover can occur during lateral movement by abusing WebDAV shares. Inspired by @tifkin_’s and the Certified
After working on Pass the Hash attack and Over the pass attack, it’s time to focus on a similar kind of attack called Pass the
Pass the Ccache is a credential access and lateral movement technique where an attacker steals or generates a Kerberos ccache file containing a valid TGT, then uses
In this post, we’re going to talk about Over Pass the hash that added another step in passing the hash. Pass the hash is an
In this article, we learn to use crackmapexec. This tool is developed by byt3bl33d3r. I have used this tool many times for both offensive and
WMI is used for a lot of stuff, but it can also be used for Lateral Movement around the network. This can be achieved using