Pentester's Promiscuous Notebook
Twitter
GitHub
Blog
Sponsor
Search
⌃
K
Links
README
⚒️ Pentest
C2
Infrastructure
AD
ACL Abuse
AD CS Abuse
ADIDNS Abuse
Attack Trusts
Attack RODCs
AV / EDR Evasion
Authentication Coercion
Credentials Harvesting
Discovery
DnsAdmins
Dominance
GPO Abuse
Kerberos
Key Credentials Abuse
LAPS
Lateral Movement
Overpass-the-Hash
Pass-the-Hash
Pass-the-Ticket
RDP
RPC
RunAs
SMB
SPN-jacking
WinRM / PSRemoting
WMI
LDAP
NTLM
Password Spraying
Post Exploitation
Pre-created Computers Abuse
PrivExchange
Privileges Abuse
RID Cycling
SCCM / MECM Abuse
SMB
RPC
Token Manipulation
User Hunt
WSUS
Zerologon
DevOps
DBMS
Authentication Brute Force
File Transfer
IPMI
Kiosk Breakout
Low-Hanging Fruits
LPE
Networks
NFS
Persistence
Pivoting
Post Exploitation
SNMP
SSH
TFTP
VNC
Misc
OSINT
Password Brute Force
Perimeter
Shells
Web
Wi-Fi
⚔️ Red Team
Basics
Cobalt Strike
Infrastructure
Malware Development
SE
⚙️ Admin
Git
Linux
Networking
Virtualization
Windows
Powered By
GitBook
Lateral Movement
https://eventlogxp.com/blog/logon-type-what-does-it-mean/
https://www.infosecmatter.com/rce-on-windows-from-linux-part-1-impacket/
https://www.hackingarticles.in/remote-code-execution-using-impacket/
https://xakep.ru/2020/11/16/lateral-guide/
https://docs.microsoft.com/en-us/defender-for-identity/playbook-lateral-movement
https://www.alteredsecurity.com/post/fantastic-windows-logon-types-and-where-to-find-credentials-in-them
https://docs.microsoft.com/en-us/windows-server/identity/securing-privileged-access/reference-tools-logon-types
Last modified
1yr ago