95% off for Members

Lateral Movement and Pivoting in Cyber Security Cheat Sheets

RM 24.12
95% off for Cyber Security Notes & Cheat Sheets Members. Promotion auto-applied on checkout.

This comprehensive cheat sheet provides an in-depth look into the techniques attackers use to move through a network after gaining initial access.

The document  covers a wide range of topics, from understanding the attacker's perspective and the lateral movement lifecycle to detailed, hands-on examples of remote process execution, authentication attacks, and port forwarding.

The guide is structured to walk you through the process, from abusing built-in administrative tools and exploiting credential-based vulnerabilities like Pass-the-Hash and Pass-the-Ticket, to leveraging network misconfigurations through SSH and socat tunneling.

Table of Contents:

  • What is Lateral Movement? 
  • Remote Process Execution 
  • Remote Process Creation via WinRM 
  • Creating Scheduled Tasks Remotely 
  • Using WMI for Lateral Movement 
  • NTLM Authentication 
  • Pass-the-Hash (PtH) 
  • Extracting NTLM Hashes 
  • Using Pass-the-Hash with Mimikatz 
  • Kerberos Authentication 
  • Pass-the-Ticket (PtT) 
  • Overpass-the-Hash / Pass-the-Key 
  • Overpass-the-Hash (OPtH) Variant 
  • Abusing Writable Shares 
  • RDP Hijacking 
  • Port Forwarding for Lateral Movement 
  • SSH Tunneling 
  • SSH Remote Port Forwarding 
  • SSH Local Port Forwarding 
  • Port Forwarding with socat 
  • Dynamic Port Forwarding and SOCKS 

Page Count: 37

Format : PDF

By Purchasing This Product, You Are Agreeing To The Terms of Service Below

https://motasem-notes.net/tos

Note: This product is not eligible for a refund.

If you have concerns regarding the product, kindly contact consultation@motasem-notes.net and clarify your issue and explain why the eligibility for a refund.

Dropdown