Rooms

  • Zero Logon (Get admin access to an AD without credentials).

  • Breaching AD (Getting the first set of credentials in an AD environment).

  • Exploiting AD (Learn common AD exploitation techniques).

  • Post-Exploitation basics (What an attacker does after gaining an initial foothold of AD).

Last updated