Search

Home

PNPT Studies

PJPT Studies

AD CS / Certificate Attacks (ESC1-15) (1, 8, 11 for now)

Report Writing / Client Presentation

Operationalizing Cybercrime Data (June 2025)

Internal Attack Prio

image
  • Run Responder and mitm6 (beginning of the day or after lunch) and generate traffic for it using nmap or vuln scans or whatever scans
  • if scans are too long, look at websites in scope. Enum them with msfconsole (http_version) and use it to sweep different networks (subnets) to find alive hosts.
  • passback and default credentials!
image

^good steps until you find a lateral movement