# Lateral Movement
htARTE (HackTricks AWS Red Team Expert) ! qaStaHvIS AWS hacking jatlhlaHbe'chugh * qaStaHvIS cybersecurity company 'oH? HackTricks 'e' vItlhutlh company advertise chay' HackTricks vItlhutlh? 'ej PEASS latest version download HackTricks PDF vItlhutlh? [**SUBSCRIPTION PLANS**](https://github.com/sponsors/carlospolop) qaStaHvIS! * [**The PEASS Family**](https://opensea.io/collection/the-peass-family) 'e' vItlhutlh [**NFTs**](https://opensea.io/collection/the-peass-family) 'e' vItlhutlh * [**official PEASS & HackTricks swag**](https://peass.creator-spring.com) vItlhutlh * [**💬**](https://emojipedia.org/speech-balloon/) [**Discord group**](https://discord.gg/hRep4RUj7f) 'ej [**telegram group**](https://t.me/peass) 'ej **Twitter** 🐦[**@carlospolopm**](https://twitter.com/hacktricks_live)**.** * **hacktricks repo** 'ej [**hacktricks-cloud repo**](https://github.com/carlospolop/hacktricks-cloud) **PRs** submit **hacking tricks** share **qaStaHvIS**.
There are different different ways to execute commands in external systems, here you can find the explanations on how the main Windows lateral movements techniques work: * [**PsExec**](../ntlm/psexec-and-winexec.md) * [**SmbExec**](../ntlm/smbexec.md) * [**WmicExec**](../ntlm/wmicexec.md) * [**AtExec / SchtasksExec**](../ntlm/atexec.md) * [**WinRM**](../ntlm/winrm.md) * [**DCOM Exec**](dcom-exec.md) * [**Pass the cookie**](https://cloud.hacktricks.xyz/pentesting-cloud/azure-security/az-lateral-movements/az-pass-the-cookie) (cloud) * [**Pass the PRT**](https://cloud.hacktricks.xyz/pentesting-cloud/azure-security/az-lateral-movements/pass-the-prt) (cloud) * [**Pass the AzureAD Certificate**](https://cloud.hacktricks.xyz/pentesting-cloud/azure-security/az-lateral-movements/az-pass-the-certificate) (cloud)
htARTE (HackTricks AWS Red Team Expert) !qaStaHvIS AWS hacking jatlhlaHbe'chugh! * qaStaHvIS cybersecurity company 'oH? HackTricks 'e' vItlhutlh company advertise chay' HackTricks vItlhutlh? 'ej PEASS latest version download HackTricks PDF vItlhutlh? [**SUBSCRIPTION PLANS**](https://github.com/sponsors/carlospolop) qaStaHvIS! * [**The PEASS Family**](https://opensea.io/collection/the-peass-family) 'e' vItlhutlh [**NFTs**](https://opensea.io/collection/the-peass-family) 'e' vItlhutlh * [**official PEASS & HackTricks swag**](https://peass.creator-spring.com) vItlhutlh * [**💬**](https://emojipedia.org/speech-balloon/) [**Discord group**](https://discord.gg/hRep4RUj7f) 'ej [**telegram group**](https://t.me/peass) 'ej **Twitter** 🐦[**@carlospolopm**](https://twitter.com/hacktricks_live)**.** * **hacktricks repo** 'ej [**hacktricks-cloud repo**](https://github.com/carlospolop/hacktricks-cloud) **PRs** submit **hacking tricks** share **qaStaHvIS**.