Active Capabilities
π Network Enumeration (T1046)
Nmap service discovery and port scanning to identify attack surface across domain hosts.
Target: Service DiscoveryπΊοΈ Active Directory Mapping (T1087.002)
BloodHound/SharpHound automated AD object ingestion to identify shortest path to Domain Admin.
Target: Attack Path Analysisπ« Kerberoasting (T1558.003)
GetUserSPNs.py requesting TGS tickets for service accounts, enabling offline password cracking.
Target: Service Account Passwordsπ AS-REP Roasting (T1558.004)
GetNPUsers.py extracting AS-REP hashes from accounts without Kerberos pre-authentication.
Target: No Pre-Auth Accountsπ¨ Offline Password Cracking (T1110.002)
Hashcat and John the Ripper brute forcing captured NTLM and Kerberos ticket hashes.
Target: Weak Passwordsπ NTLM Relay Attack (T1557.001)
Responder + ntlmrelayx capturing and relaying authentication to high-value targets.
Target: SMB Signing Disabledπ Database Brute Force (T1110.001)
Hydra credential stuffing attacks against MySQL root account with weak authentication.
Target: Remote Database Accessπ Remote Code Execution (T1021.002)
Impacket psexec.py and wmiexec.py for authenticated remote command execution via SMB.
Target: Lateral Movementπ RDP Session Hijacking (T1563.002)
Exploiting unrestricted RDP access and disabled NLA to hijack executive sessions.
Target: Domain Admin Sessionsπ Pass-the-Hash (T1550.002)
CrackMapExec using captured NTLM hashes for authentication without cracking passwords.
Target: Credential Reuseπ DCSync Attack (T1003.006)
Secretsdump.py leveraging DCSync rights to dump all domain password hashes from DC01.
Target: Domain Credential Dumpingπ Token Impersonation (T1134.001)
Juicy Potato and PrintSpoofer exploiting SeImpersonate privilege for SYSTEM escalation.
Target: Service Account Escalationπ Web Shell Deployment (T1505.003)
Uploading ASP.NET web shells to IIS wwwroot via weak directory permissions for persistence.
Target: Web Server Backdoorπ Registry Auto-Run (T1547.001)
Creating Run keys for malicious payloads ensuring execution on system startup.
Target: Persistent Accessπ€ Data Exfiltration (T1041)
MySQL data dumping and SMB file transfer simulating sensitive data theft via C2 channel.
Target: Database & File ExfiltrationOperational Documentation
Coming Soon
Standard Operating Procedures for attack simulations.
Coming Soon
Standard Operating Procedures for attack simulations.
Coming Soon
Standard Operating Procedures for attack simulations.
Coming Soon
Standard Operating Procedures for attack simulations.
Coming Soon
Standard Operating Procedures for attack simulations.
Coming Soon
Standard Operating Procedures for attack simulations.