Certified Red Team Professional (CRTP) - Notes
HomeGitHubPortfolioTwitter/XMediumCont@ct
  • ๐Ÿ“Certified Red Team Professional (CRTP) - Notes
    • โ„น๏ธ0 - Course Summary
      • 1.1
      • 1.2
    • 1๏ธโƒฃ1 - Active Directory (AD)
      • 1.1 - Introduction to Active Directory (AD)
      • 1.2 - Physical Components of AD
      • 1.3 - Logical Components of AD
    • 2๏ธโƒฃ2 - PowerShell
      • 2.1 - Introduction to PowerShell
      • 2.2 - Security and Detection
    • 3๏ธโƒฃ3 - AD Enumeration
      • 3.1 - Host & User Identification
      • 3.2 - Common Services Enum
        • 3.2.1 - LDAP & DNS Enum
        • 3.2.2 - SMB Enum & Common Attacks
      • 3.3 - Domain Enumeration
        • 3.3.1 - PowerView
          • 3.3.1.1 - Domain Enumeration (Video Lab)
        • 3.3.2 - BloodHound
    • 4๏ธโƒฃ4 - Trust and Privileges Mapping
      • 4.1 - Access Control (ACL/ACE)
      • 4.2 - Group Policy
      • 4.3 - Trusts
    • 5๏ธโƒฃ5 - Local Privilege Escalation
      • 5.1 - Privilege Escalation
        • 5.1.1 - Feature Abuse
        • 5.1.2 - Relaying
        • 5.1.3 - GPO Abuse
        • 5.1.4 - Unquoted Service Path
      • 5.2 - Tools
    • 6๏ธโƒฃ6 - Lateral Movement
      • 6.1 - PowerShell Remoting & Tradecraft
      • 6.2 - Crentials Extraction & Mimikatz
    • 9๏ธโƒฃ7 - Kerberos Attack and Defense (Golden, Silver tickets and more)
      • 7.1 - Kerberos Intro
      • 7.2 - AS-REP Roasting
      • 7.3 - Kerberoasting
      • 7.4 - User Enum in Kerberos
    • 6๏ธโƒฃ8 - Persistence
      • 8.1 - Golden Ticket
      • 8.2 - Silver Ticket
      • 8.3 - Diamond Ticket
    • Lab
      • 0 - Lab Instructions
      • 1 - Learning Object 1๏ธ
      • 2 - Learning Object 2๏ธ
      • 3 - Learning Object 3๏ธ
      • 4 - Learning Object 4๏ธ
      • 5 - Learning Object 5๏ธ
      • 6 - Learning Object 6๏ธ
      • 7 - Learning Object 7๏ธ
    • ๐Ÿ“„Report
      • How to write a PT Report
  • ๐Ÿ›ฃ๏ธRoadMap / Exam Preparation
  • ๐Ÿ“”CRTP Cheat Sheet
Powered by GitBook
On this page
  • Main Concepts
  • Background Information
  • Concepts and Pratice
  • Learning Course Topics
  • Video Resources
  • Training and Labs
  • Altered Security Resources
  • Reporting
  • CheatSheet

RoadMap / Exam Preparation

PreviousHow to write a PT ReportNextCRTP Cheat Sheet

Last updated 7 days ago

Main Concepts

Here below the path I used and which I would recommend to reach a level necessary to pass the exam. ๐Ÿ‘‡

Background Information

Concepts and Pratice

  • Active ๐Ÿšฉ HTB CTF ๐ŸŸข - My Writeup

  • Return ๐Ÿšฉ HTB CTF ๐ŸŸข - My Writeup

  • Sauna ๐Ÿšฉ HTB CTF ๐ŸŸข - My Writeup

  • Forest ๐Ÿšฉ HTB CTF ๐ŸŸข - My Writeup

  • Cascade ๐Ÿšฉ HTB CTF ๐ŸŸ  - My Writeup

  • Intelligence ๐Ÿšฉ HTB CTF ๐ŸŸ  - My Writeup

  • Monteverde ๐Ÿšฉ HTB CTF ๐ŸŸ  - My Writeup

  • Resolute ๐Ÿšฉ HTB CTF ๐ŸŸ  - My Writeup

  • Blackfield ๐Ÿšฉ HTB CTF ๐Ÿ”ด - My Writeup

  • Mantis ๐Ÿšฉ HTB CTF ๐Ÿ”ด - My Writeup

  • Search ๐Ÿšฉ HTB CTF ๐Ÿ”ด - My Writeup

Learning Course Topics

23 Learning Objectives, 59 Tasks, > 120 Hours of Torture

1 - Active Directory Enumeration

  • Use scripts, built-in tools and Active Directory module to enumerate the target domain.

  • Understand and practice how useful information like users, groups, group memberships, computers, user properties etc. from the domain controller is available to even a normal user.

  • Understand and enumerate intra-forest and inter-forest trusts. Practice how to extract information from the trusts.

  • Enumerate Group policies.

  • Enumerate ACLs and learn to find out interesting rights on ACLs in the target domain to carry out attacks.

  • Learn to use BloodHound and understand its applications in a red team operation.

2 - Offensive PowerShell Tradecraft

  • Learn how PowerShell tools can still be used for enumeration.

  • Learn to modify existing tools to bypass Windows Defender.

  • Bypass PowerShell security controls and enhanced logging like System Wide Transcription, Anti Malware Scan Interface (AMSI), Script Blok Logging and Constrained Language Mode (CLM)

3 - Offensive .NET Tradecraft

  • Learn how to modify and use .NET tools to bypass Windows Defender and Microsoft Defender for Endpoint (MDE).

  • Learn to use .NET Loaders that can run assemblies in-memory.

4 - Local Privilege Escalation

  • Learn and practice different local privilege escalation techniques on a Windows machine.

  • Hunt for local admin privileges on machines in the target domain using multiple methods.

  • Abuse enterprise applications to execute complex attack paths that involve bypassing antivirus and pivoting to different machines.

5 - Domain Privilege Escalation

  • Learn to find credentials and sessions of high privileges domain accounts like Domain Administrators, extracting their credentials and then using credential replay attacks to escalate privileges, all of this with just using built-in protocols for pivoting.

  • Learn to extract credentials from a restricted environment where application whitelisting is enforced. Abuse derivative local admin privileges and pivot to other machines to escalate privileges to domain level.

  • Understand the classic Kerberoast and its variants to escalate privileges.

  • Enumerate the domain for objects with unconstrained delegation and abuse it to escalate privileges.

  • Find domain objects with constrained delegation enabled. Understand and execute the attacks against such objects to escalate privileges to a single service on a machine and to the domain administrator using alternate tickets.

  • Learn how to abuse privileges of Protected Groups to escalate privileges

6 - Domain Persistence and Dominance

  • Abuse Kerberos functionality to persist with DA privileges. Forge tickets to execute attacks like Golden ticket, Silver ticket and Diamond ticket to persist.

  • Subvert the authentication on the domain level with Skeleton key and custom SSP.

  • Abuse the DC safe mode Administrator for persistence.

  • Abuse the protection mechanism like AdminSDHolder for persistence.

  • Abuse minimal rights required for attacks like DCSync by modifying ACLs of domain objects.

  • Learn to modify the host security descriptors of the domain controller to persist and execute commands without needing DA privileges.

7 - Cross Trust Attacks

  • Learn to elevate privileges from Domain Admin of a child domain to Enterprise Admin on the forest root by abusing Trust keys and krbtgt account.

  • Execute intra-forest trust attacks to access resources across forest.

  • Abuse SQL Server database links to achieve code execution across forest by just using the databases.

8 - Abusing AD CS

  • Learn about Active Directory Certificate Services and execute some of the most popular attacks.

  • Execute attacks across Domain trusts to escalate privileges to Enterprise Admins.

9 - Defenses and bypass โ€“ MDE EDR

  • Learn about Microsoftโ€™s EDR โ€“ Microsoft Defender for Endpoint.

  • Understand the telemetry and components used by MDE for detection.

  • Execute an entire chain of attacks across forest trust without triggering any alert by MDE.

  • Use Security 365 dashboard to verify MDE bypass.

10 - Defenses and bypass โ€“ MDI

  • Learn about Microsoft Identity Protection (MDI).

  • Understand how MDI relies on anomaly to spot an attack.

  • Bypass various MDI detections throughout the course.

11 - Defenses and bypass โ€“ Architecture and Work Culture Changes

  • Learn briefly about architecture and work culture changes required in an organization to avoid the discussed attacks. We discuss Temporal group membership, ACL Auditing, LAPS, SID Filtering, Selective Authentication, credential guard, device guard, Protected Users Group, PAW, Tiered Administration and ESAE or Red Forest

12 - Defenses โ€“ Monitoring

  • Learn about useful events logged when the discussed attacks are executed.

13 - Defenses and Bypass โ€“ Deception

  • Understand how Deception can be effective deployed as a defense mechanism in AD.

  • Deploy decoy user objects, which have interesting properties set, which have ACL rights over other users and have high privilege access in the domain along with available protections.

  • Deploy computer objects and Group objects to deceive an adversary.

  • Learn how adversaries can identify decoy objects and how defenders can avoid the detection.

Video Resources

Training and Labs

While, if you want to go in depth, the best way is to practice is using GOAD lab environment (1st lab required more resources than 2nd)

Altered Security Resources

CheatSheet

Windows Fundamentals Module ๐Ÿ 

Intro To Offensive Security ๐Ÿ 

Pentesting Fundamentals ๐Ÿ 

eJPTv2 Ine Full Course ๐Ÿ—’๏ธ

Post Exploitation Basics ๐Ÿ 

Sudo Security Bypass ๐Ÿ 

Windows Privilege Escalation ๐Ÿ—’๏ธ

Windows Privesc Arena ๐Ÿ 

Windows Privesc ๐Ÿ 

Bypass UAC ๐Ÿ 

Post-Exploitation Basics ๐Ÿ 

Active Directory Basics ๐Ÿ  - ๐Ÿ‡ฎ๐Ÿ‡น

Enumerating Active Directory ๐Ÿ 

VulnNet: Active ๐Ÿ 

Active Directory Hardening ๐Ÿ 

Compromising Active Directory๐Ÿ 

Blue ๐Ÿšฉ ๐ŸŸข -

๐Ÿ‡ฌ๐Ÿ‡ง ๐ŸŽฆ

๐Ÿ‡ฌ๐Ÿ‡ง ๐ŸŽฆ

๐Ÿ‡ฌ๐Ÿ‡ง ๐ŸŽฆ

๐Ÿ‡ฌ๐Ÿ‡ง ๐ŸŽฆ

๐Ÿ‡ฌ๐Ÿ‡ง ๐ŸŽฆ

๐Ÿ‡ฌ๐Ÿ‡ง ๐ŸŽฆ

๐Ÿ‡ฎ๐Ÿ‡น ๐ŸŽฆ

If you active the basic subscription you'll have 30 days of lab access with modules for each main topic called Learning Objects, .

or more better create an own homemade lab, following this :

๐Ÿ—’๏ธ

โฉ

โฉ

โฉ

โฉ

๐Ÿ—’๏ธ

๐Ÿ›ฃ๏ธ
THM Room
THM Room
THM Room
eJPTv2 Notes
THM Room
THM Room
Hackersploit Article
THM Room
THM Room
THM Room
THM Room
THM Room
Walkthrough ITA
THM Room
THM Room
THM Room
THM Room
THM CTF
My Writeup
Windows Privilege Escalation - Video EN
OSCP Guide 10/12 โ€“ Active Directory - Video EN
The Cyber Mentor (TCM) - Hacking Active Directory for Beginners - Video EN
The Cyber Mentor (TCM) - Windows Privilege Escalation for Beginners - Video EN
Cisco and Pentester Academy Attacking Active Directory Class with Nikhil Mittal - Video EN
Active Directory - John Hammond Series - Video EN
Active Directory THM Room Walkthrough - Esadecimale - Video ITA
here my walkthrough
guide
https://dev-angelist.gitbook.io/building-a-vulnerable-active-directory-lab
Reporting
How to write a PT Report โ€” My Notes
Writing a PT Report โ€” TCM
ITProTV Report
OSCP โ€” How to Take Effective Notes
OSCP โ€” How to Write a Report
CRTP - CheatSheet
LogoEverything Active Directory and WindowsPentest Everything
LogoGitHub - Orange-Cyberdefense/GOAD: game of active directoryGitHub
LogoAttacking & Defending Active Directory Lab (CRTP)Altered Security
LogoTrainings | Altered SecurityAltered Security