DarthSidious
Search…
Darth Sidious
The goal is simple To share my modest knowledge about hacking Windows systems. This is commonly refered to as red team exercises. This book however, is also very concerned with the blue team; the defenders. That is, helping those who are working as defenders, analysts and security experts to build secure Active Directory environments and monitor them for malicious activity.
There are three major parts in this book 1. Building a lab 2. Hacking it 3. Defending it
I have structured this book so it can be followed more or less sequentally. To practice many of these things, a lab is necessary. That is why I have made a few guides on how to build a lab, with varying degrees of comprehensiveness and size.

Getting started

Getting the Source Code

The source for this book is available in the book's github repository.

Changelog

Date
Who
What
May 2017
chryzsh
Book created
March 2018
chryzsh
Restructured book
30.03.2018
bufferov3rride
Added article Pivoting Through Exchange
02.04.2018
chryzsh
Restructured book again and removed some unfinished articles
11.04.2018
chryzsh
Added the article Building a malware analysis lab
14.04.2018
chryzsh
Added the article Password cracking and auditing
23.04.2018
filippos
Added the article CrackMapExec
06.05.2018
chryzsh
Fixed a link messup and some restructuring
Questions/Suggestions: Ping me on Twitter @chryzsh
Last modified 3yr ago