Skip to main contentSkip to main content
Room Banner
Back to all walkthroughs
Room Icon

The Lay of the Land

Premium room

Learn about and get hands-on with common technologies and security products used in corporate environments; both host and network-based security solutions are covered.

easy

60 min

32,023

User profile photo.
User profile photo.

To access material, start machines and answer questions login.

It is essential to be familiar with the environment where you have initial access to a compromised machine during a red team engagement. Therefore, performing reconnaissance and enumeration is a significant part, and the primary goal is to gather as much information as possible to be used in the next stage. 

With an initial foothold established, the post-exploitation process begins! 

 

This room introduces commonly-used concepts, technologies, and security products that we need to be aware of.

In this room, the assumption is that we have already gained access to the machine, and we are ready to expand our knowledge more about the environment by performing enumerating for the following:

 

 

 

  • Network infrastructure
  • Active Directory Environment
  • Users and Groups
  • Host-based security solutions
  • Network-based security solutions
  • Applications and services
Answer the questions below
Let's start learning!

Ready to learn Cyber Security?

The The Lay of the Land room is only available for premium users. Signup now to access more than 500 free rooms and learn cyber security through a fun, interactive learning environment.

Already have an account? Log in

We use cookies to ensure you get the best user experience. For more information see our cookie policy.