Task 1Introduction
Task 2Starting the Network
Task 3Technical Background
Task 4Reconnaissance
Task 5Exploitation Using Windows
Task 6Exploitation Using Linux
Task 7Mitigation and Conclusion
Ready to learn Cyber Security?
The AD: BadSuccessor room is only available for premium users. Signup now to access more than 500 free rooms and learn cyber security through a fun, interactive learning environment.
Already have an account? Log in