# Gaining Access

- [IP Forwarding](/infrastructure-testing/gaining-access/ip-forwarding.md)
- [VLAN Information](/infrastructure-testing/gaining-access/vlan-hopping.md)
- [Psexec](/infrastructure-testing/gaining-access/psexec.md): Execute a command-line process on a remote machine.
- [Upgrading shell](/infrastructure-testing/gaining-access/upgrading-shell.md): Have fully interactive shell
- [Reverse Shells One-Liners](/infrastructure-testing/gaining-access/reverse-shells-one-liners.md): Common reverse shells
- [Bruteforce](/infrastructure-testing/gaining-access/bruteforce.md): force your way through
- [MITM cleartext protocols](/infrastructure-testing/gaining-access/mitm-cleartext-protocols.md)
- [Null session](/infrastructure-testing/gaining-access/null-session.md): null session is an anonymous connection to an inter-process communication network service on Windows-based computers
- [LLMNR / NBT NS Spoofing](/infrastructure-testing/gaining-access/llmnr-nbt-ns-spoofing.md)
- [Port knocking](/infrastructure-testing/gaining-access/port-knocking.md): Port Knocking is a well-established method used by both defenders and adversaries to hide open ports from access.
- [Downloading/Transfer files](/infrastructure-testing/gaining-access/downloading-transfer-files.md): Download files to the victim machine
- [Remote Desktop](/infrastructure-testing/gaining-access/remote-desktop.md): How to use RDP (Remote desktop protocol) to gain access to a host, rdp runs on port 3389 by default in windows.
- [NAC Bypass](/infrastructure-testing/gaining-access/nac-bypass.md): Bypassing annoying network access controls
- [Pass-The-Hash](/infrastructure-testing/gaining-access/pass-the-hash.md): Pass the hash is a hacking technique that allows an attacker to authenticate to a remote server or service by using the underlying NTLM or LanMan hash of a user's password.
