hacktricks/windows-hardening/lateral-movement/README.md

26 lines
1.9 KiB
Markdown
Raw Normal View History

2024-04-06 18:13:07 +00:00
# Lateral Movement
2022-04-28 16:01:33 +00:00
<details>
<summary><strong>从零开始学习AWS黑客技术成为专家</strong> <a href="https://training.hacktricks.xyz/courses/arte"><strong>htARTEHackTricks AWS红队专家</strong></a><strong></strong></summary>
2022-04-28 16:01:33 +00:00
* 您在**网络安全公司**工作吗想要在HackTricks中看到您的**公司广告**?或者想要访问**PEASS的最新版本或下载HackTricks的PDF**?请查看[**订阅计划**](https://github.com/sponsors/carlospolop)!
* 探索[**PEASS家族**](https://opensea.io/collection/the-peass-family),我们独家的[**NFTs**](https://opensea.io/collection/the-peass-family)收藏品
* 获取[**官方PEASS和HackTricks周边产品**](https://peass.creator-spring.com)
2024-04-06 18:13:07 +00:00
* **加入** [**💬**](https://emojipedia.org/speech-balloon/) [**Discord群组**](https://discord.gg/hRep4RUj7f) 或 [**电报群组**](https://t.me/peass) 或在**Twitter**上关注我 🐦[**@carlospolopm**](https://twitter.com/hacktricks\_live)**。**
* 通过向[hacktricks repo](https://github.com/carlospolop/hacktricks)和[hacktricks-cloud repo](https://github.com/carlospolop/hacktricks-cloud)提交PR来分享您的黑客技巧。
2022-04-28 16:01:33 +00:00
</details>
在外部系统中执行命令有不同的方法这里您可以找到关于主要Windows横向移动技术如何工作的解释
2022-08-13 15:36:34 +00:00
2024-04-06 18:13:07 +00:00
* [**PsExec**](psexec-and-winexec.md)
* [**SmbExec**](smbexec.md)
* [**WmicExec**](wmicexec.md)
* [**AtExec / SchtasksExec**](atexec.md)
* [**WinRM**](winrm.md)
2022-09-27 00:18:19 +00:00
* [**DCOM Exec**](dcom-exec.md)
* [**传递cookie**](https://cloud.hacktricks.xyz/pentesting-cloud/azure-security/az-lateral-movements/az-pass-the-cookie) (云)
* [**传递PRT**](https://cloud.hacktricks.xyz/pentesting-cloud/azure-security/az-lateral-movements/pass-the-prt) (云)
* [**传递AzureAD证书**](https://cloud.hacktricks.xyz/pentesting-cloud/azure-security/az-lateral-movements/az-pass-the-certificate) (云)