In this chapter, we will cover the following recipes:
- Spawning a TTY shell
- Looking for weakness
- Horizontal escalation
- Vertical escalation
- Node hopping: pivoting
- Privilege escalation on Windows
- PowerSploit
- Pulling plaintext passes with mimikatz
- Dumping other saved passwords from the machine
- Pivoting
- Backdooring executables for persistence