📘
CAS Cybersecurity
CtrlK
  • Start
  • Reconnaissance
  • Docker basics and Images
  • Scanning and Enumeration
  • Vulnerability Scanning and Analysis
  • Exploitation
  • Man in the Middle
  • Windows Hacking
    • Throwback Network
    • WinAttack LAB
      • Module 01
      • Module 02
      • Module 03
      • Module 04
      • Module 05
      • Module 06
      • Module 07
      • Module 08
      • Module 09
      • Module 10
  • Web Application Security
  • CTF and Crypto Exercises
  • Threat Intelligence
  • Forensic Exercises
  • Malware Analysis
  • Android Malware
  • Forensic Readiness
  • Live Response
Powered by GitBook
On this page

Was this helpful?

  1. Windows Hacking

WinAttack LAB

Modules

  • 01 - Host Discovery with nmap

  • 02 - Situational Awareness / Privilege Escalation

  • 03 - AD Information Gathering

  • 04 - Mimikatz

  • 05 - Pass the hash

  • 06 - Situational Awareness on FS1

  • 07 - Password Spraying

  • 08 - Lateral movement to WS1

  • 09 - Credential Dumping on WS1

  • 10 - Abusing Domain Admin

PreviousFirst ContactNextModule 01

Last updated 3 years ago

Was this helpful?