DarthSidious
  • Darth Sidious
  • GETTING STARTED
    • Getting started
    • External network access to Domain Admin
    • Intro to Windows hashes
  • Building a lab
    • Building a lab
    • Preparing Kali
    • Building a small lab
    • Building a lab with ESXI and Vagrant
    • Cuckoo malware analysis lab
  • Initial access
    • Password spraying
    • Initial access through exchange
  • ENUMERATION
    • Powershell
    • BloodHound
    • PowerView
    • Azure enumeration
  • Execution
    • Pass the hash
    • Responder with NTLM relay and Empire
    • DeathStar
    • CrackMapExec
  • Privilege escalation
    • Mimikatz
    • Token Impersonation
    • Juicy Potato
    • ALPC bug 0day
  • Defense evasion
    • Bypassing Applocker and Powershell contstrained language mode
    • From RDS app to Empire shell
    • Stealth
  • OTHER
    • Link encyclopedia
    • Writeups
      • lkylabs v1
    • War stories
      • Domain admin in 30 minutes
  • Credential access
    • Password cracking and auditing
  • Command & Control
    • SILENTTRINITY
Powered by GitBook
On this page
  • Getting started
  • Getting the Source Code
  • Changelog

Darth Sidious

NextGetting started

Last updated 7 years ago

The goal is simple To share my modest knowledge about hacking Windows systems. This is commonly refered to as red team exercises. This book however, is also very concerned with the blue team; the defenders. That is, helping those who are working as defenders, analysts and security experts to build secure Active Directory environments and monitor them for malicious activity.

There are three major parts in this book 1. Building a lab 2. Hacking it 3. Defending it

I have structured this book so it can be followed more or less sequentally. To practice many of these things, a lab is necessary. That is why I have made a few guides on how to build a lab, with varying degrees of comprehensiveness and size.

Getting started

Getting the Source Code

Changelog

Date

Who

What

May 2017

chryzsh

Book created

March 2018

chryzsh

Restructured book

30.03.2018

bufferov3rride

02.04.2018

chryzsh

Restructured book again and removed some unfinished articles

11.04.2018

chryzsh

14.04.2018

chryzsh

23.04.2018

filippos

06.05.2018

chryzsh

Fixed a link messup and some restructuring

The source for this book is available in the .

Added article

Added the article

Added the article

Added the article

Questions/Suggestions: Ping me on Twitter

GETTING STARTED
book's github repository
@chryzsh
Pivoting Through Exchange
Building a malware analysis lab
Password cracking and auditing
CrackMapExec