EJPTV2 Cheat Sheet by - Yash Mehta
Ctrlk
  • Information Gathering & Enumeration
  • Vulnerabilities in services
  • Exploitation
  • Post Exploitation
    • Privilege Escalation
    • Hash Dumping
      • Windows hash dumping
        • MimiKatz,Kiwi
        • Pass the hash
      • Linux Hash Dumping
      • Crack the Hash
    • Pivoting
    • Transferring Files
    • Meterpreter
    • Persistence
    • Clearing Tracks
    • Local Enumeration
  • Web App Pentesting
Powered by GitBook
On this page
  1. Post Exploitation
  2. Hash Dumping

Windows hash dumping

MimiKatz,KiwiPass the hash
PreviousHash DumpingNextMimiKatz,Kiwi

Last updated 1 year ago