Building an Active Directory domain and hacking it
Branch: master
Clone or download
Permalink
Type Name Latest commit message Commit time
Failed to load latest commit information.
.gitbook/assets GitBook: [master] 7 pages and 57 assets modified Nov 13, 2018
assets Track 2 files into repository. Apr 15, 2018
building-a-lab GitBook: [master] 15 pages and one asset modified Aug 16, 2018
bypass GitBook: [master] 64 pages and 15 assets modified May 3, 2018
command-and-control GitBook: [master] one page modified Nov 14, 2018
credential-access GitBook: [master] 4 pages modified Jun 4, 2018
defense-evasion GitBook: [master] 7 pages and 57 assets modified Nov 13, 2018
defense Updates defense/defense.md Apr 15, 2018
enumeration GitBook: [master] 7 pages and 57 assets modified Nov 13, 2018
evasion Updates evasion/README.md Apr 15, 2018
execution GitBook: [master] 34 pages modified May 6, 2018
exploitation GitBook: [master] 64 pages and 15 assets modified May 3, 2018
general GitBook: [master] 64 pages and 15 assets modified May 3, 2018
getting-started GitBook: [master] 15 pages and one asset modified Aug 16, 2018
initial-access GitBook: [master] 7 pages and 57 assets modified Nov 13, 2018
notes Creates stuff/miniguide.md Mar 23, 2018
other GitBook: [master] 18 pages modified May 6, 2018
privilege-escalation GitBook: [master] 7 pages and 57 assets modified Nov 13, 2018
responder GitBook: [master] 64 pages and 15 assets modified May 3, 2018
stuff GitBook: [master] 64 pages and 15 assets modified May 3, 2018
writeups GitBook: [master] 64 pages and 15 assets modified May 3, 2018
.gitignore GitBook Example Jul 4, 2016
README.md GitBook: [master] 15 pages and one asset modified Aug 16, 2018
SUMMARY.md GitBook: [master] 7 pages and 57 assets modified Nov 13, 2018

README.md

Darth Sidious

The goal is simple
To share my modest knowledge about hacking Windows systems. This is commonly refered to as red team exercises. This book however, is also very concerned with the blue team; the defenders. That is, helping those who are working as defenders, analysts and security experts to build secure Active Directory environments and monitor them for malicious activity.

There are three major parts in this book

  1. Building a lab
  2. Hacking it
  3. Defending it

I have structured this book so it can be followed more or less sequentally. To practice many of these things, a lab is necessary. That is why I have made a few guides on how to build a lab, with varying degrees of comprehensiveness and size.

Getting started

GETTING STARTED

Getting the Source Code

The source for this book is available in the book's github repository.

Changelog

Date Who What
May 2017 chryzsh Book created
March 2018 chryzsh Restructured book
30.03.2018 bufferov3rride Added article Pivoting Through Exchange
02.04.2018 chryzsh Restructured book again and removed some unfinished articles
11.04.2018 chryzsh Added the article Building a malware analysis lab
14.04.2018 chryzsh Added the article Password cracking and auditing
23.04.2018 filippos Added the article CrackMapExec
06.05.2018 chryzsh Fixed a link messup and some restructuring

Questions/Suggestions: Ping me on Twitter @chryzsh