Situational Awarness

Introduction

Once gaining access to the compromised environment a common step is to gather as much information as possible. All the information gathered in this stage will help the pentester to map the domain, escalate privileges and perform lateral movements.
Copy link