Exploiting Active Directory

Exploiting Active Directory

Learn common AD exploitation techniques that can allow you to reach your goal in an AD environment.

Enumerating Active Directory

Enumerating Active Directory

This room covers various Active Directory enumeration techniques, their use cases as well as drawbacks.

Breaching Active Directory

Breaching Active Directory

This network covers techniques and tools that can be used to acquire that first set of AD credentials that can then be used to enumerate AD.

Sandbox Evasion

Sandbox Evasion

Learn about active defense mechanisms Blue Teamers can deploy to identify adversaries in their environment.

Advent of Cyber 2024

Advent of Cyber 2024

Dive into the wonderful world of cyber security by engaging in festive beginner-friendly exercises every day in the lead-up to Christmas!

AV Evasion: Shellcode

AV Evasion: Shellcode

Learn shellcode encoding, packing, binders, and crypters.

Signature Evasion

Signature Evasion

Learn how to break signatures and evade common AV, using modern tool-agnostic approaches.

Living Off the Land

Living Off the Land

Learn the essential concept of 'Living Off the Land' in Red Team engagements.

Firewalls

Firewalls

Learn about and experiment with various firewall evasion techniques, such as port hopping and port tunneling.

Evading Logging and Monitoring

Evading Logging and Monitoring

Learn how to bypass common logging and system monitoring, such as ETW, using modern tool-agnostic approaches.