# WinAttack LAB

![](https://3977837039-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MfT0VPyK6X13Egd9pzy%2Fuploads%2FrhyEvWNNvG1Nx9wcRAMO%2Fintro01.png?alt=media\&token=8c980695-f035-4f0b-b57a-aea6817c97b7)

## Modules

* [01 - Host Discovery with nmap](https://cas-cyber.gitbook.io/cas-cybersecurity/windows-hacking/winattack-lab/module-01)
* [02 - Situational Awareness / Privilege Escalation](https://cas-cyber.gitbook.io/cas-cybersecurity/windows-hacking/winattack-lab/module-02)
* [03 - AD Information Gathering](https://cas-cyber.gitbook.io/cas-cybersecurity/windows-hacking/winattack-lab/module-03)
* [04 - Mimikatz](https://cas-cyber.gitbook.io/cas-cybersecurity/windows-hacking/winattack-lab/module-04)
* [05 - Pass the hash](https://cas-cyber.gitbook.io/cas-cybersecurity/windows-hacking/winattack-lab/module-05)
* [06 - Situational Awareness on FS1](https://cas-cyber.gitbook.io/cas-cybersecurity/windows-hacking/winattack-lab/module-06)
* [07 - Password Spraying](https://cas-cyber.gitbook.io/cas-cybersecurity/windows-hacking/winattack-lab/module-07)
* [08 - Lateral movement to WS1](https://cas-cyber.gitbook.io/cas-cybersecurity/windows-hacking/winattack-lab/module-08)
* [09 - Credential Dumping on WS1](https://cas-cyber.gitbook.io/cas-cybersecurity/windows-hacking/winattack-lab/module-09)
* [10 - Abusing Domain Admin](https://cas-cyber.gitbook.io/cas-cybersecurity/windows-hacking/winattack-lab/module-10)

![](https://3977837039-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MfT0VPyK6X13Egd9pzy%2Fuploads%2F7UDrkiCyGIaLA3aRtV8E%2Fintro02.png?alt=media\&token=6ed78aed-d465-488c-a7b9-03af23965414)
