Post Compromise

Learn about the steps taken by an attacker right after gaining an initial foothold on a network.
After gaining access to your target network, get ready to learn how to establish your first point of persistence, elevate privileges locally, gain awareness of your surroundings and gather enough information to plan your future moves carefully. By the end of the module, you will gain the skills required to secure your initial foothold and identify key points on the network that you can later use to define your attack strategy.

0%
The Lay of the Land
Learn about and get hands-on with common technologies and security products used in corporate environments; both host and network-based security solutions are covered.
0%
Enumeration
This room is an introduction to enumeration when approaching an unknown corporate environment.
0%
Windows Privilege Escalation
Learn the fundamentals of Windows privilege escalation techniques.
0%
Windows Local Persistence
Learn the most common persistence techniques used on Windows machines.
0%
Lateral Movement and Pivoting
Learn about common techniques used to move laterally across a Windows network.
0%
Data Exfiltration
An introduction to Data Exfiltration and Tunneling techniques over various protocols.
What are modules?
A learning pathway is made up of modules, and a module is made of bite-sized rooms (think of a room like a mini security lab).
