Lateral Movement and Pivoting in Cyber Security Cheat Sheets
This comprehensive cheat sheet provides an in-depth look into the techniques attackers use to move through a network after gaining initial access.
The document covers a wide range of topics, from understanding the attacker's perspective and the lateral movement lifecycle to detailed, hands-on examples of remote process execution, authentication attacks, and port forwarding.
The guide is structured to walk you through the process, from abusing built-in administrative tools and exploiting credential-based vulnerabilities like Pass-the-Hash and Pass-the-Ticket, to leveraging network misconfigurations through SSH and socat tunneling.
Table of Contents:
- What is Lateral Movement?
- Remote Process Execution
- Remote Process Creation via WinRM
- Creating Scheduled Tasks Remotely
- Using WMI for Lateral Movement
- NTLM Authentication
- Pass-the-Hash (PtH)
- Extracting NTLM Hashes
- Using Pass-the-Hash with Mimikatz
- Kerberos Authentication
- Pass-the-Ticket (PtT)
- Overpass-the-Hash / Pass-the-Key
- Overpass-the-Hash (OPtH) Variant
- Abusing Writable Shares
- RDP Hijacking
- Port Forwarding for Lateral Movement
- SSH Tunneling
- SSH Remote Port Forwarding
- SSH Local Port Forwarding
- Port Forwarding with socat
- Dynamic Port Forwarding and SOCKS
Page Count: 37
Format : PDF
By Purchasing This Product, You Are Agreeing To The Terms of Service Below
Note: This product is not eligible for a refund.
If you have concerns regarding the product, kindly contact consultation@motasem-notes.net and clarify your issue and explain why the eligibility for a refund.