NTLM Relay Attacks

Performing NTLM relay attacks using SMB and LDAP.

Credential Interception Using Malicious SMB Shares

How to intercept NTLM-SSP hashed credentials for offline cracking.

What You Need to Know About Kerberoasting

An overview of Kerbroasting to extract service account credentials.

Lateral Movement With Named Pipes

A demonstraton of named pipe communication using Meterpreter.