8bytes
Learn common AD exploitation techniques that can allow you to reach your goal in an AD environment.
This room covers various Active Directory enumeration techniques, their use cases as well as drawbacks.
This network covers techniques and tools that can be used to acquire that first set of AD credentials that can then be used to enumerate AD.
This room will introduce the basic concepts and functionality provided by Active Directory.
Learn about active defense mechanisms Blue Teamers can deploy to identify adversaries in their environment.
Dive into the wonderful world of cyber security by engaging in festive beginner-friendly exercises every day in the lead-up to Christmas!
Learn shellcode encoding, packing, binders, and crypters.
Learn how to break signatures and evade common AV, using modern tool-agnostic approaches.
Learn the essential concept of 'Living Off the Land' in Red Team engagements.
Learn about and experiment with various firewall evasion techniques, such as port hopping and port tunneling.