Navigation : Reconnaissance Enumeration Initial access Exploitation Post-Exploitation - Post-Exploitation Unix -- File transfer -- Privilege escalation -- Collect credentials - Post-Exploitation Windows - Post-Exploitation AD - Pivoting / tunneling - Password cracking Wi-Fi Web Misc Forensic Post-Exploitation Unix File transfer Privilege escalation Collect credentials Post-Exploitation File transfer