Back to all modules

Initial Access

Explore the different techniques to gain initial access to a target system and network from a Red Teamer’s perspective.

In this module, we will cover the different strategies to gain access to a system in a simulated target network. Explore a variety of popular passive reconnaissance tools, learn about techniques to weaponize files, attack passwords and logins, and practice sending a phishing campaign to exploit a system in our simulated labs.

Loading...

Loading rooms...

Need to know
Next Steps

What are modules?

A learning pathway is made up of modules, and a module is made of bite-sized rooms (think of a room like a mini security lab).

Learning Structure Diagram