Once you have a beacon on one endpoint, the game becomes expanding across the network to reach the objective and surviving long enough to complete it. This module covers lateral movement techniques, persistence mechanisms, and the operational discipline that keeps you in the environment after detection attempts.
Lateral movement categories
- Credential-based: use captured credentials to authenticate to another system
- Trust-based: abuse built-in Windows/network trusts (Kerberos delegation, pass-the-hash, pass-the-ticket)
- Exploit-based: target a vulnerable service running on another host
- Tool-based: ssh, psexec, WMI, WinRM, scheduled tasks, SCCM
- Application-layer: VPN access, Citrix, RDP gateways, Jump servers
Credential access β the prerequisite
Most lateral movement starts with credentials or credential material:
- Mimikatz / lsass dump: extract cleartext passwords, NTLM hashes, Kerberos tickets from LSASS memory. On modern Windows with Credential Guard, harder β must bypass or compromise before Credential Guard initialized
- DCSync: if you have a user with Replicating Directory Changes permission, request any user’s password hash from the domain controller
- Kerberoasting: request Kerberos service tickets for accounts with SPNs; crack offline to recover plaintext passwords (covered in the AD track)
- AS-REP Roasting: for accounts with “Do not require Kerberos preauthentication” set; extract crackable hash material
- Token impersonation: when elevated on a box, impersonate tokens of logged-in users β often lands you SYSTEM or domain admin
- Browser saved passwords / SSO cookies: often overlooked; a user’s browser has passwords to internal apps
Pass-the-hash / pass-the-ticket / over-pass-the-hash
# Pass-the-hash with Impacket (from Linux attacker box)
impacket-psexec -hashes :NTLMHASH DOMAIN/user@target.corp
impacket-wmiexec -hashes :NTLMHASH DOMAIN/user@target.corp
# Pass-the-ticket with Rubeus (from Windows beacon)
Rubeus.exe ptt /ticket:BASE64TICKET
# Now your current session has the ticket; authenticate to services as that user
# Over-pass-the-hash: use NTLM hash to request TGT (becomes Kerberos-native)
Rubeus.exe asktgt /user:alice /domain:corp.local /rc4:NTLMHASH /ptt
WMI / WinRM / PsExec β the delivery mechanisms
- WMI (via
wmiexecor CobaltStrike’s built-in): executes commands remotely via Windows Management Instrumentation. Authentication via NTLM/Kerberos. Logs to Windows Event Log but often missed by default - WinRM / PowerShell Remoting (via
psremoting,Invoke-Command): elegant and widely used by admins, which makes it blend. Port 5985/5986 - PsExec / psexec-style: drops a service binary; more logs; more detection signals. Noisier
- DCOM: MMC20.Application and similar; bypasses some WMI logging
- Named pipes + SMB: SMB beacons over named pipes β pivot through a first beacon without direct C2 from the new host
Persistence β surviving the day
Persistence mechanisms by detection cost:
Continue reading with Basic tier (βΉ499/month)
You've read 33% of this module. Unlock the remaining deep-dive, quiz, and every other Intermediate module.