Post-Compromise Enumeration
This following pages discuss enumeration techniques once you have compromised an account/accounts and you have footstep in the network
Enumeration is a very important, if not the most important phase. You should be taking your time and collecting as much as you can information that you can use afterwards to lead your attacks.
Last updated