security
-
{Task 1} Introduction Active Directory (AD) enumeration is a crucial first step in penetration testing Microsoft Windows enterprise networks. During many internal penetration tests, we are often given VPN access to the target network without user credentials. That means we need to gather as much information as possible about the domain: users, groups, computers, and policies. This will…
-
{Task 1} Introduction In this room, we’ll dive into different session types and how to investigate several log types at the application level to identify compromise. Learning Prerequisites Before diving into this room, it is recommended to complete the rooms below for better comprehension: Learning Objectives {Task 2} Recap: Session & JWT Recap Before diving in, let’s…
-
Task 1 Introduction Malware refers to software or code created to damage systems, steal information, or allow unauthorised access. It appears in many forms, each with different tactics and goals. Malware can affect businesses in many ways, from financial loss and stolen data to disrupted services and reputational damage. Knowing how malware works is one of…
