Joined Adversary Simulation Manual
search
Ctrlk
  • Joined Adversary Simulation Manual
  • Reconnaissancechevron-right
  • Resource Developmentchevron-right
  • Initial Accesschevron-right
  • Executionchevron-right
  • Persistencechevron-right
  • Privilege Escalationchevron-right
  • Defense Evasionchevron-right
  • Credential Accesschevron-right
  • Discoverychevron-right
    • Account Discovery
    • Application Window Discovery
    • Browser Bookmark Discovery
    • Cloud Infrastructure Discovery
    • Cloud Service Dashboard
    • Cloud Service Discovery
    • Cloud Trust Discovery
    • Domain Trust Discovery
    • File and Directory Discovery
    • Network Service Scanning
    • Network Share Discovery
    • Network Sniffing
    • Password Policy Discovery
    • Peripheral Device Discovery
    • Permission Groups Discovery
    • Process Discovery
    • Query Registry
    • Remote System Discovery
    • Software Discovery
    • System Information Discovery
    • System Network Configuration Discovery
    • System Network Connections Discovery
    • System Owner-User Discovery
    • System Service Discovery
    • System Time Discovery
    • Virtualization-Sandbox Evasion
  • Lateral Movementchevron-right
  • Collectionchevron-right
  • Command and Controlchevron-right
  • Exfiltrationchevron-right
  • Impactchevron-right
  • General Pentestingchevron-right
  • Tricks
  • Toolschevron-right
  • Contributors
  • Kudos, References and Further Reading
gitbookPowered by GitBook
block-quoteOn this pagechevron-down

Discovery

Account Discoverychevron-rightApplication Window Discoverychevron-rightBrowser Bookmark Discoverychevron-rightCloud Infrastructure Discoverychevron-rightCloud Service Dashboardchevron-rightCloud Service Discoverychevron-rightCloud Trust Discoverychevron-rightDomain Trust Discoverychevron-rightFile and Directory Discoverychevron-rightNetwork Service Scanningchevron-rightNetwork Share Discoverychevron-rightNetwork Sniffingchevron-rightPassword Policy Discoverychevron-rightPeripheral Device Discoverychevron-rightPermission Groups Discoverychevron-rightProcess Discoverychevron-rightQuery Registrychevron-rightRemote System Discoverychevron-rightSoftware Discoverychevron-rightSystem Information Discoverychevron-rightSystem Network Configuration Discoverychevron-rightSystem Network Connections Discoverychevron-rightSystem Owner-User Discoverychevron-rightSystem Service Discoverychevron-rightSystem Time Discoverychevron-rightVirtualization-Sandbox Evasionchevron-right
PreviousUnsecured Credentialschevron-leftNextAccount Discoverychevron-right

Last updated 4 years ago

Was this helpful?

Was this helpful?