eCPTX Certified Penetration Tester eXtreme
HomeCertifications
  • Study Notes
  • Preparing the Attack
    • ✅Social Engineering Attack Vectors
    • ✅Delivering a Triggerable Outlook Malware via Macros
    • Custom Undetectable Macro Development
    • Establishing A Shell Through The Victim's Browser
  • Red Teaming Active Directory
    • ✅Reconnaissance & Enumeration
    • Red Teaming Active Directory
  • Red Teaming Critical Domain Infrastructure
    • Red Teaming MS SQL Server
    • ✅Red Teaming Exchange
    • ✅Red Teaming WSUS
  • Evasion
    • Defense Evasion
Powered by GitBook
On this page
  • Red Teaming Active Directory - Study Guide
  • AMSI Evasion and Clear-text Passwords Despite the Mimikatz Patch
  • Test your knowledge: AMSI Evasion and Clear-text Passwords Despite the Mimikatz Patch
  • Hijacking Kerberos Tickets to Remotely Access the Intranet
  • Test your knowledge: Hijacking Kerberos Tickets to Remotely Access the Intranet
  • Alternative Paths for Credential Extraction
  • Test your knowledge: Alternative Paths for Credential Extraction
  • Making a State-Backed Hacking Implant Invisible
  • Test your knowledge: Making a State-Backed Hacking Implant Invisible
  • Red-teaming Active Directory Lab #1 (ELS.LOCAL)
  • Red-teaming Active Directory Lab #2 (ELS.BANK)
  • Red-teaming Active Directory Lab #3 (ELS.CORP)

Was this helpful?

  1. Red Teaming Active Directory

Red Teaming Active Directory

Red Teaming Active Directory - Study Guide

AMSI Evasion and Clear-text Passwords Despite the Mimikatz Patch

Test your knowledge: AMSI Evasion and Clear-text Passwords Despite the Mimikatz Patch

Hijacking Kerberos Tickets to Remotely Access the Intranet

Test your knowledge: Hijacking Kerberos Tickets to Remotely Access the Intranet

Alternative Paths for Credential Extraction

Test your knowledge: Alternative Paths for Credential Extraction

Making a State-Backed Hacking Implant Invisible

Test your knowledge: Making a State-Backed Hacking Implant Invisible

Red-teaming Active Directory Lab #1 (ELS.LOCAL)

Red-teaming Active Directory Lab #2 (ELS.BANK)

Red-teaming Active Directory Lab #3 (ELS.CORP)

PreviousReconnaissance & EnumerationNextRed Teaming MS SQL Server

Last updated 2 years ago

Was this helpful?