Pass Attacks

The Adversary will try to move laterally in the environment in search for some critical servers/assets. • Some of the techniques that can be used are : • PowerShell Remoting • Windows Management Instrumentation (WMI) • Invoke-Mimikatz.ps1 etc It is advised to choose a method which is stealth and leave almost no footprints on ANY machines the Adversary is targeting.

Last updated