3. Exploitation:
Enumeration methods that can be used after compromising a domain user credentials and Remote code execution methods after compromising administrative credentials.
Full breakdown: bitvijays.github.io/LFF-IPS-P3-Exploitation.html
4. Post Exploitation:
Different methods to gather credentials after getting an administrative remote shell. Also, performing post-exploitation to leave high-impact to C-Level executives is also covered in this section.
Full breakdown: bitvijays.github.io/LFF-IPS-P4-PostExploitation.html