Intel-driven
Opsec
Preparation
Weaponisation
Password attacks
Phishing
Enumeration
Escalation
Persistence
Lateral movement and pivoting
Data exfiltration
After gaining a foothold, enumeration is the key to privilege escalation.
Collect more information that will aid us in gaining more access to the target network.
Passive scanning
Linux
Windows
DNS
SMB
SNMP
More windows tools