EXAM

Module 1: various stages of an attack life cycle

Course Introduction

Command & Control

External Reconnaissance

Initial Compromise

Host Reconnaissance

Host Persistence

Host Privilege Escalation

Domain Reconnaissance

Lateral Movement

Credentials & User Impersonation

Password Cracking Hints & Tips

Module 2: Active Directory abuse scenarios + Proxies and Port forwards

Session Passing

Pivoting

Data Protection API (DPAPI)

Kerberos

Group Policy

Discretionary Access Control Lists