Blog Archives

Post-Exploitation with “Incognito”.

Incognito is a tool used to escalate privileges inside an Active Directory domain on the post exploitation phase of a PenTest. It was born as a standalone tool, later was included in Metasploit as a module and finally it was

Posted in Incognito, Metasploit, Post-Exploitation