Back to all modules

Attacks and Exploits

Attacks and Exploits icon

Discover the various attacks and exploits that can be used against web applications, MS Windows, MS Active Directory, and Linux.

This module starts by introducing the most common vulnerabilities in web applications. Then it explains MS Windows privilege escalation, persistence, and credential harvesting. Furthermore, it explores breaching and persisting Active Directory. Finally, it covers Linux exploits and privilege escalation.

Attacks and Exploits icon
image

0%

HTTP in Detail

Learn about how you request content from a web server using the HTTP protocol

image

0%

OWASP Top 10 - 2021

Learn about and exploit each of the OWASP Top 10 vulnerabilities; the 10 most critical web security risks.

image

0%

OWASP Juice Shop

This room uses the Juice Shop vulnerable web application to learn how to identify and exploit common web application vulnerabilities.

image

0%

Phishing

Learn what phishing is and why it's important to a red team engagement. You will set up phishing infrastructure, write a convincing phishing email and try to trick your target into opening your email in a real-world simulation.

image

0%

Windows Privilege Escalation

Learn the fundamentals of Windows privilege escalation techniques.

image

0%

Windows Local Persistence

Learn the most common persistence techniques used on Windows machines.

image

0%

Active Directory Basics

This room will introduce the basic concepts and functionality provided by Active Directory.

image

0%

Breaching Active Directory

This network covers techniques and tools that can be used to acquire that first set of AD credentials that can then be used to enumerate AD.

image

0%

Linux Privilege Escalation

Learn the fundamentals of Linux privilege escalation. From enumeration to exploitation, get hands-on with over 8 different privilege escalation techniques.

image

0%

Lateral Movement and Pivoting

Learn about common techniques used to move laterally across a Windows network.

image

0%

Persisting Active Directory

Learn about common Active Directory persistence techniques that can be used post-compromise to ensure the blue team will not be able to kick you out during a red team exercise.

image

0%

Credentials Harvesting

Apply current authentication models employed in modern environments to a red team approach.

What are modules?

A learning pathway is made up of modules, and a module is made of bite-sized rooms (think of a room like a mini security lab).

Module tree diagram

We use cookies to ensure you get the best user experience. For more information contact us.

Read more