Windows Post-Exploitation

Reference Walk-Throughs

HackTheBox

Legacy

Once you’ve gained access to a Windows target, you’ll want to begin exploring the environment to discover as much information as you can. The information you discover can help you to elevate privileges, compromise running services, and potentially pivot into other systems on the network.

The following sections outline various techniques and commands useful on Windows systems for post-exploitation activities.

Topic List