# Pass Attacks

The Adversary will try to move laterally in the environment in search for some critical\
servers/assets.\
• Some of the techniques that can be used are :\
• PowerShell Remoting\
• Windows Management Instrumentation (WMI)\
• Invoke-Mimikatz.ps1 etc\
It is advised to choose a method which is stealth and leave almost no footprints on ANY\
machines the Adversary is targeting.
