The Adversary will try to move laterally in the environment in search for some critical
servers/assets.
• Some of the techniques that can be used are :
• PowerShell Remoting
• Windows Management Instrumentation (WMI)
• Invoke-Mimikatz.ps1 etc
It is advised to choose a method which is stealth and leave almost no footprints on ANY
machines the Adversary is targeting.