Skip to content

Latest commit

 

History

History
1 lines (1 loc) · 348 Bytes

File metadata and controls

1 lines (1 loc) · 348 Bytes

In this Module, we will learn some of the various attacks and exploits used against web applications, MS Windows, MS Active Directory and Linux. This module includes twelve rooms, starting with HTTP in Detail, and we will work our way through various fun rooms, including OWASP Juice Shop, Windows Priv Esc, AD Breaching and Credential Harvesting.