Skip to content

Latest commit

 

History

History
42 lines (32 loc) · 1.42 KB

assume-breach-execution-cycle.md

File metadata and controls

42 lines (32 loc) · 1.42 KB
description cover coverY layout
Discover comprehensive insights into the Assume Breach Execution Cycle in our in-depth article. Learn strategies, understand its implications and how it impacts cybersecurity.
.gitbook/assets/CRTP.png
0
cover title description tableOfContents outline pagination
visible size
true
hero
visible
true
visible
true
visible
true
visible
true
visible
true

🔥 Assume Breach Execution Cycle

CRTP - Assume Breach

CRTP Lab uses the methodology "Assume Breach", they provide us with a user account with low-level privileges, and the focus of the exam is after the Initial Comprise phase.

No phishing, no exploits, no CVEs - Let's Live Of The Land while breaching ADs.

Initial Access Granted

Upon starting the CRTP Lab's challenge, a low-level user account is already compromised. With the Initial Compromise phase out of the way, the real test of skill begins.

Mission Objective: Privilege Escalation

Using only native tools and resources, our task is to escalate privileges within the Active Directory environment. This environment mimics real-world networks, requiring careful maneuvering and a deep understanding of AD

{% embed url="https://digitalocean.pxf.io/c/3259613/1373783/15890" %}

{% embed url="https://cli-ck.me/buy-nessus" %}