- OWASP
- Active Directory Basics (This room will introduce the basic concepts and functionality provided by Active Directory)
- Breaching Active Directory (This network covers techniques and tools that can be used to acquire that first set of AD credentials that can then be used to enumerate AD)
- Enumerating Active Directory (This room covers various Active Directory enumeration techniques, their use cases as well as drawbacks)
- Attacktive Directory (99% of Corporate networks run off of AD. But can you exploit a vulnerable Domain Controller?)
- Post-Exploitation Basics (Learn the basics of post-exploitation and maintaining access with mimikatz, bloodhound, powerview and msfvenom)
- RootMe
- Simple CTF
- Eternal Blue
- Vulnversity
- Pickle Rick
- Brooklyn Nine Nine
- Kenobi
- Bounty Hacker
- Overpass
- LazyAdmin
- Ignite
- Bolt
- Agent Sudo
- Startup
- Wgel
- Blog
- ColdBox
- Lian_Yu
- Blaster
- Ice
- Devel
- Bank
- Delivery
- Active
- Analytics
- Bashed
- Valentine
- Sau
- Sunday
- Cap
- Celestial - OnGoing
- Poison - OnGoing
- Install and configure DVWA
- Command Injection
- Cross Site Request Forgery (CSRF)
- File Inclusion (LFI + RFI)
- SQL Injection (SQLi)
- Install and configure OWASP Secure Bank