Foothold Exploiting the web application or services on the machine; User Finding a way into a staff account with a few more privileges; Root Exploiting a privilege escalation to access the system&39;s root account
Every HTB machine has a similar kill chain Reconnaissance Discovering what exists on the machine
Also this document describes the Homeland Security HSPD-12 smart card security standard and related Active Directory configuration
Happy Hacking Labels basic commands linux thm tryhackme