Lateral Movement and Pivoting in Cyber Security Cheat Sheets
This comprehensive cheat sheet provides an in-depth look into the techniques attackers use to move through a network after gaining initial access.
The document covers a wide range of topics, from understanding the attacker's perspective and the lateral movement lifecycle to detailed, hands-on examples of remote process execution, authentication attacks, and port forwarding.
The guide is structured to walk you through the process, from abusing built-in administrative tools and exploiting credential-based vulnerabilities like Pass-the-Hash and Pass-the-Ticket, to leveraging network misconfigurations through SSH and socat tunneling.
Table of Contents:
- What is Lateral Movement?
 - Remote Process Execution
 - Remote Process Creation via WinRM
 - Creating Scheduled Tasks Remotely
 - Using WMI for Lateral Movement
 - NTLM Authentication
 - Pass-the-Hash (PtH)
 - Extracting NTLM Hashes
 - Using Pass-the-Hash with Mimikatz
 - Kerberos Authentication
 - Pass-the-Ticket (PtT)
 - Overpass-the-Hash / Pass-the-Key
 - Overpass-the-Hash (OPtH) Variant
 - Abusing Writable Shares
 - RDP Hijacking
 - Port Forwarding for Lateral Movement
 - SSH Tunneling
 - SSH Remote Port Forwarding
 - SSH Local Port Forwarding
 - Port Forwarding with socat
 - Dynamic Port Forwarding and SOCKS
 
Page Count: 37
Format : PDF
By Purchasing This Product, You Are Agreeing To The Terms of Service Below
Note: This product is not eligible for a refund.
If you have concerns regarding the product, kindly contact consultation@motasem-notes.net and clarify your issue and explain why the eligibility for a refund.