Exploiting Active Directory

Exploiting Active Directory

Learn common AD exploitation techniques that can allow you to reach your goal in an AD environment.

Enumerating Active Directory

Enumerating Active Directory

This room covers various Active Directory enumeration techniques, their use cases as well as drawbacks.

Breaching Active Directory

Breaching Active Directory

This network covers techniques and tools that can be used to acquire that first set of AD credentials that can then be used to enumerate AD.

Active Directory Basics

Active Directory Basics

This room will introduce the basic concepts and functionality provided by Active Directory.

Sandbox Evasion

Sandbox Evasion

Learn about active defense mechanisms Blue Teamers can deploy to identify adversaries in their environment.

Advent of Cyber 2024

Advent of Cyber 2024

Dive into the wonderful world of cyber security by engaging in festive beginner-friendly exercises every day in the lead-up to Christmas!

AV Evasion: Shellcode

AV Evasion: Shellcode

Learn shellcode encoding, packing, binders, and crypters.

Signature Evasion

Signature Evasion

Learn how to break signatures and evade common AV, using modern tool-agnostic approaches.

Living Off the Land

Living Off the Land

Learn the essential concept of 'Living Off the Land' in Red Team engagements.

Firewalls

Firewalls

Learn about and experiment with various firewall evasion techniques, such as port hopping and port tunneling.