Threat Emulation

The best way to understand how attackers work is to get hands-on experience with their techniques.
Emulation is the act of imitating or mimicking a person. Defenders can imitate, or emulate, an adversarial threat against the security stack in place. With this process, defenders can measure the security stack's effectiveness and close any gaps in coverage.

0%
Attacktive Directory
99% of Corporate networks run off of AD. But can you exploit a vulnerable Domain Controller?
0%
Attacking Kerberos
Learn how to abuse the Kerberos Ticket Granting Service inside of a Windows Domain Controller
What are modules?
A learning pathway is made up of modules, and a module is made of bite-sized rooms (think of a room like a mini security lab).
