Attacks and Exploits

Discover the various attacks and exploits that can be used against web applications, MS Windows, MS Active Directory, and Linux.
This module starts by introducing the most common vulnerabilities in web applications. Then it explains MS Windows privilege escalation, persistence, and credential harvesting. Furthermore, it explores breaching and persisting Active Directory. Finally, it covers Linux exploits and privilege escalation.

0%
HTTP in Detail
Learn about how you request content from a web server using the HTTP protocol
0%
OWASP Top 10 - 2021
Learn about and exploit each of the OWASP Top 10 vulnerabilities; the 10 most critical web security risks.
0%
OWASP Juice Shop
This room uses the Juice Shop vulnerable web application to learn how to identify and exploit common web application vulnerabilities.
0%
Phishing
Learn what phishing is and why it's important to a red team engagement. You will set up phishing infrastructure, write a convincing phishing email and try to trick your target into opening your email in a real-world simulation.
0%
Windows Privilege Escalation
Learn the fundamentals of Windows privilege escalation techniques.
0%
Windows Local Persistence
Learn the most common persistence techniques used on Windows machines.
0%
Active Directory Basics
This room will introduce the basic concepts and functionality provided by Active Directory.
0%
Breaching Active Directory
This network covers techniques and tools that can be used to acquire that first set of AD credentials that can then be used to enumerate AD.
0%
Linux Privilege Escalation
Learn the fundamentals of Linux privilege escalation. From enumeration to exploitation, get hands-on with over 8 different privilege escalation techniques.
0%
Lateral Movement and Pivoting
Learn about common techniques used to move laterally across a Windows network.
0%
Persisting Active Directory
Learn about common Active Directory persistence techniques that can be used post-compromise to ensure the blue team will not be able to kick you out during a red team exercise.
0%
Credentials Harvesting
Apply current authentication models employed in modern environments to a red team approach.
What are modules?
A learning pathway is made up of modules, and a module is made of bite-sized rooms (think of a room like a mini security lab).
