Searching protocol for "lateral movement"
Detect lateral movement via PsExec and WMI.
Simulate network traversal, test segmentation.
Holistic investigations and documentation
AD security assessment with Kerberoasting.
Correlate logs for security insights.
Dominate Active Directory environments.
Lateral movement with stolen credentials.
Execute adversary simulations.
Master adversary simulation tactics.
Proxy-aware C2 framework
Exploit SCCM for domain dominance.
Exploit GPOs for AD control.