Techniques Mind Map
mindmap
root((PJPT))
Initial Access
LLMNR Poisoning
responder -I eth0
IPv6 Attacks
mitm6 -d domain
SMB Relay
ntlmrelayx.py
Password Spraying
crackmapexec smb
Quick Wins
Kerberoastingβ
GetUserSPNs.py
hashcat -m 13100
GPP Passwords
Get-GPPPassword
Token Impersonation
load incognito
BloodHound
SharpHound.exe
Credential Dumping
Mimikatz
sekurlsa::logonpasswords
lsadump::sam
NTDS.dit
secretsdump.py
ntdsutil
Lateral Movement
Pass-the-Hash
psexec.py -hashes
evil-winrm -H
Pass-the-Ticket
getTGT.py
kerberos::ptt
RDP/WinRM
xfreerdp
Enter-PSSession
Domain Admin
DCSync
lsadump::dcsync
Golden Ticket
kerberos::golden
Persistence
Backdoor accounts
Scheduled tasksQuick Commands Cheatsheet
π Start Here
π― Must Do After Credentials
π After Local Admin
π₯ Lateral Movement
Links to Detailed Guides
Technique
File
Description
Mimikatz
mimikatz-overview.md
Credential dumping
π‘ Pro Tip: Start with passive attacks (responder/mitm6) and ALWAYS try Kerberoasting after getting any valid credentials!
Last updated