CHAPTER 17
Post-Exploitation in Modern Windows Environments
In this chapter, we cover the following topics:
• User recon
• System recon
• Domain recon
• Local privilege escalation
• Active Directory privilege escalation
• Active Directory persistence
Post-exploitation is an important step in an attack. When we gain access to a system through phishing or exploitation, frequently the host we gain access to is not the host that is our end goal. Because of this, we need to be able to perform recon on users, hosts, and Active Directory objects to help identify paths where we can gain privileges and maintain our access to the network.
Post-Exploitation
In previous chapters, we have covered some ways to get into systems, now we need ...
Get Gray Hat Hacking: The Ethical Hacker's Handbook, Sixth Edition, 6th Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.