Skip to content

Commit ec60442

Browse files
authored
Update pentesting-methodology.md
1 parent 95fa902 commit ec60442

File tree

1 file changed

+0
-7
lines changed

1 file changed

+0
-7
lines changed

src/generic-methodologies-and-resources/pentesting-methodology.md

Lines changed: 0 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -96,13 +96,6 @@ If you have troubles with the shell, you can find here a small **compilation of
9696

9797
You will probably need to **extract some data from the victim** or even **introduce something** (like privilege escalation scripts). **Here you have a** [**post about common tools that you can use with these purposes**](../generic-hacking/exfiltration.md)**.**
9898

99-
> [!TIP]
100-
> For an end-to-end pivot from DLL sideloading to Rclone-based loot exfiltration from `C:\Users\Public`, see the workflow below.
101-
102-
{{#ref}}
103-
../windows-hardening/windows-local-privilege-escalation/dll-hijacking/advanced-html-staged-dll-sideloading.md
104-
{{#endref}}
105-
10699
### **10- Privilege Escalation**
107100

108101
#### **10.1- Local Privesc**

0 commit comments

Comments
 (0)