Attack Flow Diagram
Attack Steps Reference
1. Initial Access
2. Post-Compromise
3. Credential Dumping
4. Lateral Movement
5. Privilege Escalation
6. Post-Domain Compromise
Last updated