AD Attack Part 3: Post-Exploitation
AD Attack Part 3: Post-Exploitation

Part 3 will see us enter the Post-Exploitation phase of our Active Directory attack.

In this video, I utilize NetExec as a conduit to identify login potential and then Evil-WinRM.