Post-Exploitation
Post-Ex Tools
Keep your tools off the target host as much as possible
Mimikatz logonpasswords
Dump LSASS manually
Exfiltrate the dump without touching disk and run mimikatz locally
Network tools e .g. impacket, responder
Run through the C2's SOCKS proxy
Avoid post-ex tooling to disk
Run in memory - BOF or execute-assembly
Avoid powershell based tools
C# alternatives can be executed in memory
Unmanaged powershell if you absolutely have to, but it's still not considered OPSEC safe
Last updated