Home
1. Introduction
Class Schedule
Accessing the Lab
Preflight Checklist
2. Discovery & Enumeration
2.1. Asset Discovery
Nmap
2.2 Service Discovery
Nmap once again
Webshot
2.3. Vulnerability Discovery
Responder
CrackMapExec
SMB Shares
exploit-db
3. Controlled Exploitation
Unpatched Gitea
Insecure Jenkins
Remote Management Interfaces (RMI)
Mythic C2 Framework
Merlin Agent
4. Post-exploitation
Windows PE
Pass-the-hash
Linux PE
5. Documentation
Screenshots
Built with
from
Grav
and
Hugo
navigation
Real Network Penetration Testing