$5

Lateral Movement and Pivoting in Cyber Security Cheat Sheets

I want this!

Lateral Movement and Pivoting in Cyber Security Cheat Sheets

$5

This comprehensive cheat sheet provides an in-depth look into the techniques attackers use to move through a network after gaining initial access.


The document covers a wide range of topics, from understanding the attacker's perspective and the lateral movement lifecycle to detailed, hands-on examples of remote process execution, authentication attacks, and port forwarding.


The guide is structured to walk you through the process, from abusing built-in administrative tools and exploiting credential-based vulnerabilities like Pass-the-Hash and Pass-the-Ticket, to leveraging network misconfigurations through SSH and socat tunneling.


Table of Contents:

  • What is Lateral Movement?
  • Remote Process Execution
  • Remote Process Creation via WinRM
  • Creating Scheduled Tasks Remotely
  • Using WMI for Lateral Movement
  • NTLM Authentication
  • Pass-the-Hash (PtH)
  • Extracting NTLM Hashes
  • Using Pass-the-Hash with Mimikatz
  • Kerberos Authentication
  • Pass-the-Ticket (PtT)
  • Overpass-the-Hash / Pass-the-Key
  • Overpass-the-Hash (OPtH) Variant
  • Abusing Writable Shares
  • RDP Hijacking
  • Port Forwarding for Lateral Movement
  • SSH Tunneling
  • SSH Remote Port Forwarding
  • SSH Local Port Forwarding
  • Port Forwarding withsocat
  • Dynamic Port Forwarding and SOCKS


Page Count: 37

Format : PDF


By Purchasing This Product, You Are Agreeing To The Terms of Service Below

https://motasem-notes.net/tos


Note: This product is not eligible for a refund.

If you have concerns regarding the product, kindly contact consultation@motasem-notes.net and clarify your issue and explain why the eligibility for a refund.

I want this!
Size
1.28 MB
Length
37 pages
Powered by