Darth Sidious
The goal is simple To share my modest knowledge about hacking Windows systems. This is commonly refered to as red team exercises. This book however, is also very concerned with the blue team; the defenders. That is, helping those who are working as defenders, analysts and security experts to build secure Active Directory environments and monitor them for malicious activity.
There are three major parts in this book 1. Building a lab 2. Hacking it 3. Defending it
I have structured this book so it can be followed more or less sequentally. To practice many of these things, a lab is necessary. That is why I have made a few guides on how to build a lab, with varying degrees of comprehensiveness and size.
Getting started
Getting the Source Code
The source for this book is available in the book's github repository.
Changelog
Date | Who | What |
May 2017 | chryzsh | Book created |
March 2018 | chryzsh | Restructured book |
30.03.2018 | bufferov3rride | Added article Pivoting Through Exchange |
02.04.2018 | chryzsh | Restructured book again and removed some unfinished articles |
11.04.2018 | chryzsh | Added the article Building a malware analysis lab |
14.04.2018 | chryzsh | Added the article Password cracking and auditing |
23.04.2018 | filippos | Added the article CrackMapExec |
06.05.2018 | chryzsh | Fixed a link messup and some restructuring |
Questions/Suggestions: Ping me on Twitter @chryzsh
Last updated