New Job-Role Training Path: Active Directory Penetration Tester! Learn More

Supply Chain Attacks

This module provides a detailed overview of Supply Chain Attacks, covering hardware and software aspects. It explores the impact of supply chains, the lifecycle of attacks, specific vulnerabilities, and mitigation strategies.

4.63

Created by PandaSt0rm
Co-Authors: Sentinal

Hard Offensive

Summary

In this module, we'll explore the intricacies of supply chains in both hardware and software, unravel the high-impact nature of supply chain attacks, and delve into cases of notable incidents.

In the Introduction to Supply Chains section, we begin by defining a supply chain and its critical role in today's interconnected world. We'll cover both Hardware Supply Chains and Software Supply Chains, highlighting their unique characteristics and vulnerabilities.

We'll address why these attacks are high-impact and increasingly becoming a vector for adversaries. The Lifecycle of a Supply Chain Attack is broken down into eight stages, from Target Identification to Evasion and Persistence. Each stage is explored in detail, focusing on Goals & Objectives, Challenges & Considerations involved, providing a 360-degree view of how attackers orchestrate these complex operations.

Then, we’ll delve into the various stages of the Hardware Supply Chain, from Raw Material Extraction to Retail and Sales. We will explore the different Types of Attacks, their Consequences, and effective Mitigation Strategies at each stage of the hardware supply chain, providing a thorough understanding of the vulnerabilities and defence mechanisms.

Then, we will explore Common Attack Vectors in Supply Chain Attacks, ranging from Counterfeit Components to Firmware Tampering, and Hardware Interdiction. Each vector is examined in detail, including famous incidents like the Thunderstrike 2 and the activities of the NSA.

Insider Threats are another critical aspect, covering types of insider threats, their impact on supply chain security, and mitigation strategies.

Like hardware sections, the Software Supply Chain section analyses the various software development and distribution stages. This includes Development, Dependencies and Libraries, Version Control Systems, and more, each dissected for potential attack types, consequences, and mitigation strategies.

The module also explores several significant real-world incidents. Each case study provides insights into the attack methodologies, the scale of the breach, responses, and the broader impacts.

By the end of this module, you will have gained a thorough understanding of the complexities and vulnerabilities inherent in both hardware and software supply chains.

The knowledge and strategies discussed here will empower you to identify, prevent, and mitigate potential threats in your professional endeavours in cybersecurity.

The module requires a foundational understanding of the Linux command line and a grasp of information security fundamentals. It contains substantial theoretical content; therefore, it is advisable to progress slowly to maximise the benefits derived from the module.

In addition to the above, a firm grasp of the following modules can be considered as prerequisites for the successful completion of this module:

  • Linux Fundamentals
  • Web Requests
  • Introduction to Web Applications
  • Using Web Proxies

Introduction to Supply Chains


Supply chains are crucial in the global economic framework, embodying the procedures and organisations accountable for producing, distributing, and providing goods and services. Given the interwoven character of global trade, comprehending supply chains is essential for contemporary businesses.

What is a Supply Chain

A supply chain refers to the sequence of processes and entities involved in producing and distributing goods, from raw material sourcing to delivering the final product to the end user.

It is a system of organisations, people, activities, information, and resources that move a product or service from supplier to customer.

Here's a breakdown of the key components and stages in a traditional supply chain:

  1. Raw Material Suppliers: This is the starting point of the supply chain. Raw materials, whether natural resources like minerals and timber or primary agricultural products like cotton or grain, are extracted, harvested, or otherwise procured.
  2. Manufacturers: The raw materials are sent to manufacturers who transform them into finished goods or components. Manufacturing can be a multi-stage process, with raw materials being turned into intermediate goods, which are then used to produce finished goods.
  3. Storage and Distribution: This covers the storage and movement of goods post-manufacture. Warehouses are vital in holding goods before dispatch, catering to order requirements and balancing supply during demand fluctuations. Concurrently, distribution encompasses the transfer of goods between various points, such as from manufacturers to distributors or distributors to retailers. Distributors are pivotal in acquiring products from manufacturers, storing them in warehouses, and ensuring delivery to retailers or the final consumers.
  4. Retailers: Retailers are businesses that sell products directly to consumers. They can range from large departmental stores to small corner shops. Retailers buy products from manufacturers or distributors and then sell them to the end-users.
  5. Customers/End Users: These consumers buy and use the final product. They are the reason the entire supply chain exists: to fulfil their needs and demands.

Hardware Supply Chains

The principles of a supply chain described above set the stage for understanding the more specific hardware supply chain. While the traditional supply chain encompasses a wide range of products and services, the hardware supply chain zeroes in on the production and distribution of tangible, physical goods. These goods are often more complex, requiring an intricate network of suppliers and manufacturers.

  1. Raw Material Extraction: Unlike general supply chains, here, the focus is on specific metals and non-metallic minerals crucial for electronics and machinery.
  2. Component Manufacturing: This involves specialised manufacturing of semiconductors, microchips, and other crucial components like screens, batteries, and casings.
  3. Assembly: Complex products are assembled, often integrating automated machinery and manual labour, and may include installing basic software or firmware.
  4. Quality Control and Testing: More rigorous than in general supply chains, involving stress tests and performance evaluations.
  5. Packaging: Tailored for protecting and presenting hardware products, including user manuals and accessories.
  6. Distribution and Logistics: Involves extensive global networks, often more complex due to the delicate nature of electronic products.
  7. Retail and Sales: Products reach consumers through diverse channels like brick-and-mortar stores and online retailers.

The hardware supply chain extends the basic model by incorporating these additional layers of complexity and specialisation, particularly in areas like raw material extraction and component manufacturing. As we delve into the hardware supply chain, we encounter additional challenges and stages specific to electronics and machinery production. This includes the intricate process of creating semiconductors and microchips, which are fundamental to modern technology.

Software Supply Chains

Just as we extended the supply chain concept to cover the complexities of hardware supply chains, a similar extension applies to software supply chains. In contrast to physical goods, software supply chains revolve around creating, integrating, testing, and distributing digital products—software applications and systems.

This digital nature introduces unique stages and components, reflecting the non-tangible yet critically important aspects of software development and distribution.

  1. Development:

    • Specialised tools and platforms such as Integrated Development Environments (IDEs), compilers, and debuggers are employed, contrasting with physical tooling in traditional supply chains.
    • The human element, consisting of software engineers and developers, is pivotal, akin to workers in a manufacturing plant but with an emphasis on intellectual and creative output.
    • Dependencies and Libraries serve a role similar to raw materials in manufacturing, offering pre-built functionalities.
    • Version Control Systems are distinct to software, managing code alterations and collaboration, a process not present in traditional supply chains.
  2. Build and Integration: Processes such as Continuous Integration (CI) and Continuous Delivery (CD) are exclusive to software, ensuring efficient integration and delivery of code contributions.

  3. Testing: Various testing stages, including unit testing and user acceptance testing, are vital for assuring software quality, paralleling quality control in manufacturing but customised for digital products.

  4. Deployment: Deploying software to servers or cloud platforms represents a unique phase, markedly different from the logistical challenges of distributing physical goods.

  5. Distribution: Software is disseminated to users through avenues such as direct downloads, software repositories, and app stores, contrasting with the physical distribution networks of hardware.

The Impact and Importance of Supply Chains

Supply chains are the backbone of our global economy, dictating how goods and services are produced, distributed, and consumed worldwide. Their complexity and significance have grown exponentially with globalisation, technological advancements, and the demands of an ever-increasing global population.

Economic Impact

Supply chains, often perceived as mere mechanisms for moving goods and services, are pivotal in shaping a nation's economic landscape. Their profound impact on various economic dimensions is multifaceted and wide-ranging.

The most direct impact of supply chains on the economy is their contribution to the Gross Domestic Product (GDP). Every supply chain step, from raw material extraction to manufacturing to retailing, adds value to a product. This cumulative value addition contributes significantly to the GDP. Industries that are integral parts of the supply chain, such as manufacturing, logistics, and retail, are major pillars of most economies.

Supply chains are massive employment generators. They create jobs at every stage, from manual labourers in mines or farms to skilled factory workers, logistics personnel, and retail employees. These jobs span various skill sets, educational backgrounds, and experience levels. The cascading effect of this is significant: when workers spend their earnings, they stimulate other sectors of the economy, leading to even more economic activity and job creation.

Efficient supply chains bolster a nation's trading capabilities. Countries with robust and agile supply chains can export goods more competitively, creating a favourable trade balance. A positive trade balance can strengthen a nation's currency, enhance creditworthiness, and attract foreign investment.

They can also reduce the costs associated with producing and delivering goods. These savings often translate to lower prices for consumers. On the flip side, disruptions or inefficiencies in the supply chain can lead to increased costs, which might be passed on to consumers through higher prices.

Business Competitiveness

For businesses, supply chains are crucial for maintaining competitiveness. Efficient supply chains allow companies to achieve cost efficiencies through optimised logistics, reduced inventory holding costs, or well-negotiated supplier contracts.

They also play a pivotal role in ensuring customer satisfaction by ensuring products are available when and where they are wanted, enhancing customer loyalty. Moreover, supply chains enable rapid innovation, allowing businesses to swiftly introduce new products to the market, responding to changing consumer demands or technological shifts.

Social Impact

The social ramifications of supply chains are vast. They directly affect the standard of living, with efficient chains leading to a broader availability of goods at more affordable prices.

The global nature of supply chains also fosters cultural exchange, introducing products from different parts of the world and promoting intercultural understanding. Additionally, supply chains can empower local communities, especially when businesses prioritise ethical sourcing and fair trade practices.

Environmental Impact

Supply chains have a marked impact on the environment. They dictate the rate of natural resource consumption, from the raw materials extracted to the energy expended in manufacturing and transportation.

Supply chains' emissions, pollution, and waste can also have significant environmental consequences. However, modern supply chains increasingly focus on sustainability, with many companies adopting environmentally friendly practices.

Global Interconnectedness

Supply chains exemplify global interconnectedness. They are susceptible to disruptions from geopolitical tensions, natural disasters, or other unforeseen events. The recent pandemic underscored the vulnerabilities inherent in many global supply chains.

However, these chains foster partnerships between nations, industries, and companies. Such relationships often lead to collaborations in other domains, from technology exchanges to research initiatives. Diversified supply chains can also offer economic resilience, helping nations and businesses weather economic downturns more effectively.

Technological Impact

Technology is reshaping supply chains. They are at the forefront of digital transformation, integrating advancements like the Internet of Things (IoT) and artificial intelligence.

When analysed, the vast data generated by modern supply chains offers insights that can drive efficiency and predict trends. Automation and robotics, from automated warehouses to drone deliveries, also make supply chains more efficient and responsive.

Sign Up / Log In to Unlock the Module

Please Sign Up or Log In to unlock the module and access the rest of the sections.

Relevant Paths

This module progresses you towards the following Paths

Especialista de Riesgos de Ingenieria

Plan de capacitación gestión 2024

Medium Path Sections 656 Sections
Required: 6920
Reward: +1480
Path Modules
Fundamental
Path Sections 20 Sections
Reward: +10
The learning process is one of the essential and most important components that is often overlooked. This module does not teach you techniques to learn but describes the process of learning adapted to the field of information security. You will learn to understand how and when we learn best and increase and improve your learning efficiency greatly.
Fundamental
Path Sections 8 Sections
Reward: +10
Your first stop in Hack The Box Academy to become acquainted with the platform, its features, and its learning process.
Fundamental
Path Sections 23 Sections
Reward: +10
This module covers the fundamentals of penetration testing and an introduction to Hack The Box.
Fundamental
Path Sections 9 Sections
Reward: +10
This module covers topics that will help us be better prepared before conducting penetration tests. Preparations before a penetration test can often take a lot of time and effort, and this module shows how to prepare efficiently.
Fundamental
Path Sections 21 Sections
Reward: +10
As an information security professional, a firm grasp of networking fundamentals and the required components is necessary. Without a strong foundation in networking, it will be tough to progress in any area of information security. Understanding how a network is structured and how the communication between the individual hosts and servers takes place using the various protocols allows us to understand the entire network structure and its network traffic in detail and how different communication standards are handled. This knowledge is essential to create our tools and to interact with the protocols.
Fundamental
Path Sections 30 Sections
Reward: +10
This module covers the fundamentals required to work comfortably with the Linux operating system and shell.
Fundamental
Path Sections 14 Sections
Reward: +10
This module covers the fundamentals required to work comfortably with the Windows operating system.
Fundamental
Path Sections 16 Sections
Reward: +10
Active Directory (AD) is present in the majority of corporate environments. Due to its many features and complexity, it presents a vast attack surface. To be successful as penetration testers and information security professionals, we must have a firm understanding of Active Directory fundamentals, AD structures, functionality, common AD flaws, misconfigurations, and defensive measures.
Fundamental
Path Sections 11 Sections
Reward: +10
This module covers the fundamentals required to work comfortably within the macOS operating system and shell.
Medium
Path Sections 13 Sections
Reward: +10
Buffer overflows are common vulnerabilities in software applications that can be exploited to achieve remote code execution (RCE) or perform a Denial-of-Service (DoS) attack. These vulnerabilities are caused by insecure coding, resulting in an attacker being able to overrun a program's buffer and overwrite adjacent memory locations, changing the program's execution path and resulting in unintended actions.
Medium
Path Sections 11 Sections
Reward: +10
This module is your first step into Windows Binary Exploitation, and it will teach you how to exploit local and remote buffer overflow vulnerabilities on Windows machines.
Medium
Path Sections 15 Sections
Reward: +10
Network traffic analysis is used by security teams to monitor network activity and look for anomalies that could indicate security and operational issues. Offensive security practitioners can use network traffic analysis to search for sensitive data such as credentials, hidden applications, reachable network segments, or other potentially sensitive information "on the wire." Network traffic analysis has many uses for attackers and defenders alike.
Easy
Path Sections 12 Sections
Reward: +10
Nmap is one of the most used networking mapping and discovery tools because of its accurate results and efficiency. The tool is widely used by both offensive and defensive security practitioners. This module covers fundamentals that will be needed to use the Nmap tool for performing effective network enumeration.
Easy
Path Sections 21 Sections
Reward: +10
Introduction to C# aims to provide a solid foundation to understand and work with C# code. Covering the crucial foundations and more intricate concepts, providing a comprehensive depth of knowledge in C#.
Easy
Path Sections 14 Sections
Reward: +10
Automating tedious or otherwise impossible tasks is highly valued during both penetration testing engagements and everyday life. Introduction to Python 3 aims to introduce the student to the world of scripting with Python 3 and covers the essential building blocks needed for a beginner to understand programming. Some advanced topics are also covered for the more experienced student. In a guided fashion and starting soft, the final goal of this module is to equip the reader with enough know-how to be able to implement simple yet useful pieces of software.
Medium
Path Sections 17 Sections
Reward: +10
Gain the knowledge and skills to identify and use shells & payloads to establish a foothold on vulnerable Windows & Linux systems. This module utilizes a fictitious scenario where the learner will place themselves in the perspective of a sysadmin trying out for a position on CAT5 Security's network penetration testing team.
Easy
Path Sections 10 Sections
Reward: +10
This module covers the basics needed for working with Bash scripts to automate tasks on Linux systems. A strong grasp of Bash is a fundamental skill for anyone working in a technical information security role. Through the power of automation, we can unlock the Linux operating system's full potential and efficiently perform habitual tasks.
Medium
Path Sections 11 Sections
Reward: +10
As a penetration tester or red teamer, it is imperative that we understand the tools that we use inside and out and also have the ability to write out own, even simple, tools if we are on an assessment with certain constraints such as no internet or the requirement to use a customer provided host as our "attack box." A strong understanding of DNS as well as the various ways to interact with fundamental when performing any security assessment.
Medium
Path Sections 22 Sections
Reward: +10
Passwords are still the primary method of authentication in corporate networks. If strong password policies are not in place, users will often opt for weak, easy-to-remember passwords that can often be cracked offline and used to further our access. We will encounter passwords in many forms during our assessments. We must understand the various ways they are stored, how they can be retrieved, methods to crack weak passwords, ways to use hashes that cannot be cracked, and hunting for weak/default password usage.
Easy
Path Sections 6 Sections
Reward: +10
Bug bounty programs encourage security researchers to identify bugs and submit vulnerability reports. Getting into the world of bug bounty hunting without any prior experience can be a daunting task, though. This module covers the bug bounty hunting process to help you start bug bounty hunting in an organized and well-structured way. It's all about effectiveness and professionally communicating your findings.
Medium
Path Sections 8 Sections
Reward: +20
Dive into Windows digital forensics with Hack The Box Academy's "Introduction to Digital Forensics" module. Gain mastery over core forensic concepts and tools such as FTK Imager, KAPE, Velociraptor, and Volatility. Dive deep into memory forensics, disk image analysis, and rapid triaging procedures. Learn to construct timelines from MFT, USN Journals, and Windows event logs while getting hands-on with key artifacts like MFT, USN Journal, Registry Hives, Prefetch Files, ShimCache, Amcache, BAM, and SRUM data.
Medium
Path Sections 6 Sections
Reward: +20
This module initially lays the groundwork for understanding Threat Hunting, ranging from its basic definition, to the structure of a threat hunting team. The module also dives into the threat hunting process, highlighting the interrelationships between threat hunting, risk assessment, and incident handling. Furthermore, the module elucidates the fundamentals of Cyber Threat Intelligence (CTI). It expands on the different types of threat intelligence and offers guidance on effectively interpreting a threat intelligence report. Finally, the module puts theory into practice, showcasing how to conduct threat hunting using the Elastic stack. This practical segment uses real-world logs to provide learners with hands-on experience.
Hard
Path Sections 9 Sections
Reward: +20
This module offers an exploration of malware analysis, specifically targeting Windows-based threats. The module covers Static Analysis utilizing Linux and Windows tools, Malware Unpacking, Dynamic Analysis (including malware traffic analysis), Reverse Engineering for Code Analysis, and Debugging using x64dbg. Real-world malware examples such as WannaCry, DoomJuice, Brbbot, Dharma, and Meterpreter are analyzed to provide practical experience.
Medium
Path Sections 6 Sections
Reward: +20
This module provides a comprehensive introduction to Splunk, focusing on its architecture and the creation of effective detection-related SPL (Search Processing Language) searches. We will learn to investigate with Splunk as a SIEM tool and develop TTP-driven and analytics-driven SPL searches for enhanced threat detection and response. Through hands-on exercises, we will learn to identify and understand the ingested data and available fields within Splunk. We will also gain practical experience in leveraging Splunk's powerful features for security monitoring and incident investigation.
Medium
Path Sections 36 Sections
Reward: +20
Active Directory (AD) is the leading enterprise domain management suite, providing identity and access management, centralized domain administration, authentication, and much more. Due to the many features and complexity of AD, it presents a large attack surface that is difficult to secure properly. To be successful as infosec professionals, we must understand AD architectures and how to secure our enterprise environments. As Penetration testers, having a firm grasp of what tools, techniques, and procedures are available to us for enumerating and attacking AD environments and commonly seen AD misconfigurations is a must.
Easy
Path Sections 13 Sections
Reward: +20 NEW
The module contains an exploration of brute-forcing techniques, including the use of tools like Hydra and Medusa, and the importance of strong password practices. It covers various attack scenarios, such as targeting SSH, FTP, and web login forms.
Medium
Path Sections 14 Sections
Reward: +20
This module covers the fundamentals of password cracking using the Hashcat tool.
Medium
Path Sections 19 Sections
Reward: +20
Organizations regularly use a standard set of services for different purposes. It is vital to conduct penetration testing activities on each service internally and externally to ensure that they are not introducing security threats. This module will cover how to enumerate each service and test it against known vulnerabilities and exploits with a standard set of tools.
Medium
Path Sections 19 Sections
Reward: +20 NEW
A backend that handles user-supplied input insecurely can lead to devastating security vulnerabilities such as sensitive information disclosure and remote code execution. This module covers how to identify and exploit server-side bugs, including Server-Side Request Forgery (SSRF), Server-Side Template Injection (SSTI), and Server-Side Includes (SSI) injection attacks.
Medium
Path Sections 18 Sections
Reward: +20
Once a foothold is gained during an assessment, it may be in scope to move laterally and vertically within a target network. Using one compromised machine to access another is called pivoting and allows us to access networks and resources that are not directly accessible to us through the compromised host. Port forwarding accepts the traffic on a given IP address and port and redirects it to a different IP address and port combination. Tunneling is a technique that allows us to encapsulate traffic within another protocol so that it looks like a benign traffic stream.
Medium
Path Sections 11 Sections
Reward: +20
This module offers an in-depth exploration of Suricata, Snort, and Zeek, covering both rule development and intrusion detection. We'll guide you through signature-based and analytics-based rule development, and you'll learn to tackle encrypted traffic. The module features numerous hands-on examples, focusing on the detection of prevalent malware such as PowerShell Empire, Covenant, Sliver, Cerber, Dridex, Ursnif, and Patchwork. We also dive into detecting attacking techniques like DNS exfiltration, TLS/HTTP Exfiltration, PsExec lateral movement, and beaconing through IDS/IPS.
Easy
Path Sections 11 Sections
Reward: +20
This module provides a concise yet comprehensive overview of Security Information and Event Management (SIEM) and the Elastic Stack. It demystifies the essential workings of a Security Operation Center (SOC), explores the application of the MITRE ATT&CK framework within SOCs, and introduces SIEM (KQL) query development. With a focus on practical skills, students will learn how to develop SIEM use cases and visualizations using the Elastic Stack.
Medium
Path Sections 6 Sections
Reward: +20
This module covers the exploration of Windows Event Logs and their significance in uncovering suspicious activities. Throughout the course, we delve into the anatomy of Windows Event Logs and highlight the logs that hold the most valuable information for investigations. The module also focuses on utilizing Sysmon and Event Logs for detecting and analyzing malicious behavior. Additionally, we delve into Event Tracing for Windows (ETW), explaining its architecture and components, and provide ETW-based detection examples. To streamline the analysis process, we introduce the powerful Get-WinEvent cmdlet.
Easy
Path Sections 11 Sections
Reward: +20
This Hack The Box Academy module covers how to create YARA rules both manually and automatically and apply them to hunt threats on disk, live processes, memory, and online databases. Then, the module switches gears to Sigma rules covering how to build Sigma rules, translate them into SIEM queries using "sigmac", and hunt threats in both event logs and SIEM solutions. It's all hands-on, using real-world malware and techniques.
Hard
Path Sections 23 Sections
Reward: +100
Kerberos is an authentication protocol that allows users to authenticate and access services on a potentially insecure network. Due to its prevalence throughout an Active Directory environment, it presents us with a significant attack surface when assessing internal networks. This module will explain how Kerberos works thoroughly and examines several scenarios to practice the most common attacks against it from multiple perspectives.
Medium
Path Sections 27 Sections
Reward: +100
Active Directory presents a vast attack surface and often requires us to use many different tools during an assessment. The CrackMapExec tool, known as a "Swiss Army Knife" for testing networks, facilitates enumeration, attacks, and post-exploitation that can be leveraged against most any domain using multiple network protocols. It is a versatile and highly customizable tool that should be in any penetration tester's toolbox.
Medium
Path Sections 14 Sections
Reward: +100
This module covers AD enumeration focusing on the BloodHound tool. We will cover various techniques for enumerating key AD objects that will inform our attacks in later modules.
Medium
Path Sections 20 Sections
Reward: +100
Authentication plays an essential role in almost every web application. If a vulnerability arises in the application's authentication mechanism, it could result in unauthorized access, data loss, or potentially even remote code execution, depending on the application's functionality. This module will provide an overview of various access control methods, such as JWT, OAuth, and SAML, and potential attacks against each.
Hard
Path Sections 15 Sections
Reward: +100
This module explores several web vulnerabilities from a whitebox approach: Prototype Pollution, Timing Attacks & Race Conditions, and those arising from Type Juggling. We will discuss how to identify, exploit, and prevent each vulnerability.
Medium
Path Sections 20 Sections
Reward: +100
This module serves as a follow-up to the Game Hacking Fundamentals module. You will learn how to persist Cheat Engine Scripts by scanning for byte arrays, editing game assemblies, utilising runtime hooking to modify games, and tampering with game network traffic using Burp.
DACL Attacks I
mini module tag Mini-Module
Hard
Path Sections 7 Sections
Reward: +100
Discretionary Access Control Lists (DACLs), found within security descriptors, are a fundamental component of the security model of Windows and Active Directory, defining and enforcing access to the various system resources. This mini-module will cover enumerating and attacking common DACL misconfigurations, allowing us to escalate our privileges horizontally and vertically and move laterally across an Active Directory network.
Hard
Path Sections 18 Sections
Reward: +100
This module provides a detailed overview of Supply Chain Attacks, covering hardware and software aspects. It explores the impact of supply chains, the lifecycle of attacks, specific vulnerabilities, and mitigation strategies.
Medium
Path Sections 9 Sections
Reward: +100
This module covers AD enumeration focusing on the PowerView and SharpView tools. We will cover various techniques for enumerating key AD objects that will inform our attacks in later modules.
Medium
Path Sections 12 Sections
Reward: +100
This module provides an overview of Active Directory (AD), introduces core AD enumeration concepts, and covers enumeration with built-in tools.