Attack Flow Diagram

Attack Steps Reference

1. Initial Access

2. Post-Compromise

3. Credential Dumping

4. Lateral Movement

5. Privilege Escalation

6. Post-Domain Compromise

Last updated