Section 2: Tactics and Techniques
The second part of this book is dedicated to tools and techniques, including practical scripts and code, that turned out to be useful throughout pen testing engagements across the Windows, Linux, and Mac infrastructures. Many of the tools and ideas are based on the research of other people in the industry and credit and links are provided whenever possible. Many concepts and ideas are decades old and I'm certain that some references are missing.
Hopefully, this will be a useful and practical compilation of tactics and techniques to look out for during penetration testing that you can use to highlight opportunities for collaboration with your blue team so that you can work together better as a team. We will start by looking at how to map out the homefield by using graph databases, dive into the concept of hunting for credentials, and how to automate tasks, how to leverage relay phishing proxies, and how to leverage browsers post-exploitation...