Windows Post-Exploitation¶
Reference Walk-Throughs |
|
---|---|
HackTheBox |
Once you’ve gained access to a Windows target, you’ll want to begin exploring the environment to discover as much information as you can. The information you discover can help you to elevate privileges, compromise running services, and potentially pivot into other systems on the network.
The following sections outline various techniques and commands useful on Windows systems for post-exploitation activities.
Topic List