# Lateral Movement
htARTE (HackTricks AWS Red Team Expert) ! qaStaHvIS AWS hacking jatlhlaHbe'chugh
* qaStaHvIS cybersecurity company 'oH? HackTricks 'e' vItlhutlh company advertise chay' HackTricks vItlhutlh? 'ej PEASS latest version download HackTricks PDF vItlhutlh? [**SUBSCRIPTION PLANS**](https://github.com/sponsors/carlospolop) qaStaHvIS!
* [**The PEASS Family**](https://opensea.io/collection/the-peass-family) 'e' vItlhutlh [**NFTs**](https://opensea.io/collection/the-peass-family) 'e' vItlhutlh
* [**official PEASS & HackTricks swag**](https://peass.creator-spring.com) vItlhutlh
* [**💬**](https://emojipedia.org/speech-balloon/) [**Discord group**](https://discord.gg/hRep4RUj7f) 'ej [**telegram group**](https://t.me/peass) 'ej **Twitter** 🐦[**@carlospolopm**](https://twitter.com/hacktricks_live)**.**
* **hacktricks repo** 'ej [**hacktricks-cloud repo**](https://github.com/carlospolop/hacktricks-cloud) **PRs** submit **hacking tricks** share **qaStaHvIS**.
There are different different ways to execute commands in external systems, here you can find the explanations on how the main Windows lateral movements techniques work:
* [**PsExec**](../ntlm/psexec-and-winexec.md)
* [**SmbExec**](../ntlm/smbexec.md)
* [**WmicExec**](../ntlm/wmicexec.md)
* [**AtExec / SchtasksExec**](../ntlm/atexec.md)
* [**WinRM**](../ntlm/winrm.md)
* [**DCOM Exec**](dcom-exec.md)
* [**Pass the cookie**](https://cloud.hacktricks.xyz/pentesting-cloud/azure-security/az-lateral-movements/az-pass-the-cookie) (cloud)
* [**Pass the PRT**](https://cloud.hacktricks.xyz/pentesting-cloud/azure-security/az-lateral-movements/pass-the-prt) (cloud)
* [**Pass the AzureAD Certificate**](https://cloud.hacktricks.xyz/pentesting-cloud/azure-security/az-lateral-movements/az-pass-the-certificate) (cloud)
htARTE (HackTricks AWS Red Team Expert) !qaStaHvIS AWS hacking jatlhlaHbe'chugh!
* qaStaHvIS cybersecurity company 'oH? HackTricks 'e' vItlhutlh company advertise chay' HackTricks vItlhutlh? 'ej PEASS latest version download HackTricks PDF vItlhutlh? [**SUBSCRIPTION PLANS**](https://github.com/sponsors/carlospolop) qaStaHvIS!
* [**The PEASS Family**](https://opensea.io/collection/the-peass-family) 'e' vItlhutlh [**NFTs**](https://opensea.io/collection/the-peass-family) 'e' vItlhutlh
* [**official PEASS & HackTricks swag**](https://peass.creator-spring.com) vItlhutlh
* [**💬**](https://emojipedia.org/speech-balloon/) [**Discord group**](https://discord.gg/hRep4RUj7f) 'ej [**telegram group**](https://t.me/peass) 'ej **Twitter** 🐦[**@carlospolopm**](https://twitter.com/hacktricks_live)**.**
* **hacktricks repo** 'ej [**hacktricks-cloud repo**](https://github.com/carlospolop/hacktricks-cloud) **PRs** submit **hacking tricks** share **qaStaHvIS**.