March 2022
Intermediate to advanced
752 pages
18h 47m
English
In this chapter, we cover the following topics:
• User recon
• System recon
• Domain recon
• Local privilege escalation
• Active Directory privilege escalation
• Active Directory persistence
Post-exploitation is an important step in an attack. When we gain access to a system through phishing or exploitation, frequently the host we gain access to is not the host that is our end goal. Because of this, we need to be able to perform recon on users, hosts, and Active Directory objects to help identify paths where we can gain privileges and maintain our access to the network.
In previous chapters, we have covered some ways to get into systems, now we need ...