AD Privilege Escalation
CtrlK
  • Iperius Backup Service Privilege Escalation
  • ManageEngine ADSelfService Plus PrivEsc
  • Mimikatz
  • Outlook Reminder Privilege Escalation
  • UAC Windows Privilege Escalation
  • Windows PrivEsc with Kerberos
  • Windows PrivEsc with LocalPotato
  • Windows PrivEsc with Registry Keys
  • Windows PrivEsc with RemotePotato
  • Windows PrivEsc with SeBackupPrivilege
  • Windows PrivEsc with Unquoted Service Path
  • Windows Privilege Escalation
  • Windows Pivoting
  • AD CS (Active Directory Certificate Services) Pentesting
  • Dumping Windows Password Hashes
  • WSL Pentesting
  • Windows Memory Dump Analysis
  • Windows Remote Code Execution from Linux
  • Windows XML EventLog (EVTX)
  • M365 (Microsoft Office 365) Pentesting
  • Microsoft Outlook Message (.msg)
  • Microsoft Word Pentesting
  • Reading OneDrive Logs
Powered by GitBook
Page cover
On this page

Windows Pivoting

Accessing obtained over one machine to exploit another machine deeper in the network.

Enumerate Network

After entering the target server, enumerate and search other networks.

Check the ARP Cache in Target Machine

arp.exe -a
Copied!

Check IP Addresses

Get-Content c:\Windows\System32\drivers\etc\hosts
ipconfig /all
Copied!

Search Other Network Ranges

No content yet.

PreviousWindows Privilege EscalationNextAD CS (Active Directory Certificate Services) Pentesting

Last updated 1 year ago