Movement, Pivoting, and Persistence for Pentesters and Ethical Hackers is the next step in YOUR penetration testing and ethical hacking journey.
Most engagements are conducted remotely, meaning that the tester must have the ability to move about freely from outside of the network into it. We do this using various techniques. Some of the simplest can be utilizing a compromised password to access a desktop environment via remote desktop and attempting to access other machines with those credentials. More complicated techniques include utilizing compromised endpoints to act as a proxy for us, forwarding traffic from internal targets back to our own.
MP&P will cover topics such as:
- Username and Password List Generation
- Password Spraying
- Email Phishing
- Command and Control (C2)
- Credential Harvesting and Passing
- Routing, Port Forwarding, SOCKS Proxies, and Bind Usage
- Offensive PowerShell
- How the Misconfigurations We See in Real Pentests Happen
- Common Remediation Strategies You Can Use to Report to Clients