Table of contents Living Of The Land Active Directory Files Transfer File Transfer Web Downloads SMB Downloads FTP Downloads File Encryption on Windows Downloads Uploads File Read File Write Bypasses Detection Evading Detection 🔥 AMSI Bypass Enumeration Users Groups SysInfo Networking Named Pipes Local Privilege Escalation Page 1 Scheduled Service Task Scheduler Networking Layer 1 Layer 2 Layer 3 Layer 4 Checking Defenses Antivirus Firewall Extract Credentials SAM Credentials NTDS Lateral Movement WinRM RDP WinRS WMI PsExec SMB Relay Command Execution Page 2 Kerberos Attacks Kerberoasting Persistence Startup folder Credentials Registry Shadow Copy