Pentest Notes
Ctrlk
  • ๐Ÿ /home/x3m1Sec/.pt-notes
  • ๐Ÿ“Pentest Notes
  • ๐ŸŽฎCTFs
  • ๐ŸŽ“Road to certification
    • eJPTv2
    • CPTS
      • My review
      • Notes
        • Enumeration
        • Nmap
        • Attacking Common Applications
        • Attacking Common Services
        • Active Directory Enumeration & Attacks
        • Linux Privilege Escalation
        • Windows Privilege Escalation
          • Priv-Esc
          • 1.Getting the Lay of the Land
          • 2.Windows User Privileges
          • 3.Windows Group Privileges
          • 4.Attacking the OS
          • 5.Credential Theft
            • 19.Credential-hunting
            • 20.Other-files
            • 21.Further-credential-theft
          • 6.Restricted Environments
          • 7.Additional Techniques
          • 8.Dealing with End of Life Systems
        • Server-side Attacks
        • Web Attacks
        • Web Service & API Attacks
        • Command-injections
        • SQL-injection
        • XSS
        • Broken Authentication
        • Login-brute-forcing
        • Password-attacks
        • Password-cracking
        • Session Security Guide
        • File-transfer
        • File-upload-attacks
        • Shells and payloads
        • Upgrading-tty-shell
        • Using-the-metasploit-framework
        • File Inclusion
        • Ligolo-ng
        • Pivoting-tunneling-and-port-forwarding
        • TIPS
        • CheatSheet
    • OSCP
  • ๐Ÿ“šResources
Powered by GitBook
On this page
  1. ๐ŸŽ“Road to certification
  2. CPTS
  3. Notes
  4. Windows Privilege Escalation

5.Credential Theft

19.Credential-hunting20.Other-files21.Further-credential-theft
Previous18.DLL-injectionNext19.Credential-hunting

Last updated 6 months ago