Lateral Movement
Lateral movement is a technique used by attackers to move throughout an internal network in order to find sensitive information and other machines that could be used to escalate privileges.
RPC/DCOM
RPC /DCOM (Remote Procedure Call/Distributed Component Object Model) were used mainly in Windows NT, 2000, XP, and 2003. RPC/DCOM provides communication between processes on different machines.
PsExec
PsExec is part of the SysInternal toolkit, it allows administrators to run programs remotely via SMB on port 445. PsExec, historically, has been used extensively and most anti-virus will block it's execution.
WMI
Windows Management Instrumentation (WMI) provides remote management and data gathering. A wide variety of information such as about SNMP, Windows Defender information, and Application Inventory listings is provided with WMI. Transfer of file, data gathering from files, remote execution of commands, files, and the Registry are allowed with WMI.
Scheduled Tasks
Attackers will use scheduled tasks to maintain persistence on a machine. A administrator may notice an out-of-place process and kill it, ending the attackers access to the machine. A scheduled tasks that runs every so often to re-open access to the machine ensures that the attacker can access the machine again.
PS Remoting/WinRM
WinRM (Windows Remote Management) is a service that allows administrators to run powershell commands on a remote computer, a powerful tool for an attacker.
SMB
Server Message Block (SMB) is used to share files and printers in a network, in Linux the service is called Samba. Many tools are available that can use SMB to discover the Operating System of the remote host.
Responder is a tool that can be used to get credentials for SMB. Responder works by responding to broadcasts on the network asking for SMB resources, identifying itself as the SMB resource. The victim then sends it's hashed credentials to the attacker.
RDP
Remote Desktop Display (RDP) is commonly used by administrators to remotely access hosts on the network. Exploits are rare, but when there is one it can be devastating.
Seth is a tool that can be used as a man-in-the-middle attack. The attacker would need to know their own IP address, their Ethernet interface, the IP address of the victim (client), and the IP address of the target RDP host (server).
Apple Remote Desktop
Apple Remote Desktop (ARD) is similar to RDP but for Apple. There was an exploit in MacOS 10 High Sierra that included a root exploit via Screen Sharing.
VNC
Virtual Network Computing (VNC) is similar to RDP and ARP. Metasploit provides many VNC payloads, making it one of the easier means of getting remote GUI.
X-server Forwarding
X11 - or X-Windows, often simplified to X, is the graphical system used in many Linux and Unix systems. X session can be forwarded uses an SSH tunnel to a remote computer. X-sessions that are not secure can be captured and exploited.
Telnet
Telnet is an unencrypted service that provides remote shell access. Because the service is unencrypted, credentials are passed in clear text and easily stolen.
SSH
SSH (secure shell) provides a remote shell through encryption. SSH is vulnerable if there is a vulnerable version installed or if the SSH keys are stolen by the attacker.
RSH/Rlogin
The RSH/Rlogin service provides logins for remote servers. This is a legacy service and has been replaced by slogin and SSH. The service runs on port 513 and the command rlogin -l root IP
allows one to login as root to the remote server.