Cub3sec's Offensive Handbook
search
⌘Ctrlk
Cub3sec's Offensive Handbook
  • 🖥️Cub3sec's Offensive Handbook
  • 🔍Enumeration
    • 📴Passive
    • 📳Active
    • 🕸️Web Application
  • 📥Initial Access
    • 🕸️Common Web Application Attacks
    • 💉SQL Injection Attacks
    • 🧍Client-Side Attacks
    • 🔑Password Attacks
    • 🐚Shells
  • ⚔️Privilege Escalation
    • 🐧Linux
    • 🪟Windows
  • 🏍️Lateral Movement
    • 🐧Linux
    • 🪟Windows
      • File Transfer
      • Mimikatz
      • Registry Dump
  • 🖍️Reporting
    • 🖊️Report writing
  • 🚔AV Evasion
    • 💊AV Detection
    • 💉Process Memory Injection
    • shield-quarteredDefender Bypass
  • 📂Active Directory
    • 🔍Enumeration
    • axe-battleAttacking Authentication
    • key-skeletonShadow Credentials
    • mug-hotTargeted Kerberoasting
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. 🏍️Lateral Movement

🪟Windows

File Transferchevron-rightMimikatzchevron-rightRegistry Dumpchevron-right
PreviousTunneling & Port Forwardingchevron-leftNextFile Transferchevron-right