Certified Red Team Professional (CRTP) - Notes
HomeGitHubPortfolioTwitter/XMediumCont@ct
  • 📝Certified Red Team Professional (CRTP) - Notes
    • â„šī¸0 - Course Summary
      • 1.1
      • 1.2
    • 1ī¸âƒŖ1 - Active Directory (AD)
      • 1.1 - Introduction to Active Directory (AD)
      • 1.2 - Physical Components of AD
      • 1.3 - Logical Components of AD
    • 2ī¸âƒŖ2 - PowerShell
      • 2.1 - Introduction to PowerShell
      • 2.2 - Security and Detection
    • 3ī¸âƒŖ3 - AD Enumeration
      • 3.1 - Host & User Identification
      • 3.2 - Common Services Enum
        • 3.2.1 - LDAP & DNS Enum
        • 3.2.2 - SMB Enum & Common Attacks
      • 3.3 - Domain Enumeration
        • 3.3.1 - PowerView
          • 3.3.1.1 - Domain Enumeration (Video Lab)
        • 3.3.2 - BloodHound
    • 4ī¸âƒŖ4 - Trust and Privileges Mapping
      • 4.1 - Access Control (ACL/ACE)
      • 4.2 - Group Policy
      • 4.3 - Trusts
    • 5ī¸âƒŖ5 - Local Privilege Escalation
      • 5.1 - Privilege Escalation
        • 5.1.1 - Feature Abuse
        • 5.1.2 - Relaying
        • 5.1.3 - GPO Abuse
        • 5.1.4 - Unquoted Service Path
      • 5.2 - Tools
    • 6ī¸âƒŖ6 - Lateral Movement
      • 6.1 - PowerShell Remoting & Tradecraft
      • 6.2 - Crentials Extraction & Mimikatz
    • 9ī¸âƒŖ7 - Kerberos Attack and Defense (Golden, Silver tickets and more)
      • 7.1 - Kerberos Intro
      • 7.2 - AS-REP Roasting
      • 7.3 - Kerberoasting
      • 7.4 - User Enum in Kerberos
    • 6ī¸âƒŖ8 - Persistence
      • 8.1 - Golden Ticket
      • 8.2 - Silver Ticket
      • 8.3 - Diamond Ticket
    • Lab
      • 0 - Lab Instructions
      • 1 - Learning Object 1ī¸
      • 2 - Learning Object 2ī¸
      • 3 - Learning Object 3ī¸
      • 4 - Learning Object 4ī¸
      • 5 - Learning Object 5ī¸
      • 6 - Learning Object 6ī¸
      • 7 - Learning Object 7ī¸
    • 📄Report
      • How to write a PT Report
  • đŸ›Ŗī¸RoadMap / Exam Preparation
  • 📔CRTP Cheat Sheet
Powered by GitBook
On this page
  • Topics
  • Scope of Lab
  • PowerShell
  • Resources
  1. Certified Red Team Professional (CRTP) - Notes

0 - Course Summary

Topics

  1. Active Directory (AD)

  2. PowerShell

  3. Domain Enumeration

  4. Trust and Privileges Mapping

  5. Local Privilege Escalation

  6. Credential Replay Attack (Over-PTH, Token Replay, etc.)

  7. Domain Privilege Escalation

  8. Dumping System and Domain Secrets

  9. Kerberos Attack and Defense (Golden, Silver tickets and more)

  10. Abusing Cross Forest Trusts

  11. Delegation Issues

  12. Persistence Techniques

  13. Abusing SQL Server Trusts in an AD Environment

  14. Detecting Attack Techniques

  15. Defending an Active Directory Environment

  16. Bypassing Defenses

Scope of Lab

Subnet range (only on course lab) -> 172.16.1.0/24 - 172.16.17.0/24

Everything else in not in scope.

PowerShell

Powershell provides access to almost everything in a Windows platform and Active Directory Environment.

It's based on .NET framework and is integrated with Windows OS.

We'll use it to interpretate attacker methodologies and running powerful scripts.

Resources

❗ Disclaimer

Never use tools and techniques on real IP addresses, hosts or networks without proper authorization!❗

PreviousCertified Red Team Professional (CRTP) - NotesNext1.1

Last updated 5 months ago

📝
â„šī¸
LogoActive Directory Domain Services Overviewdocsmsft