j0moz4@LIITN:/web:$'s blog

h0me

c0nt3nt

ad/lab-(bleach.local)

w4ke-up-s4mura1

komm4nds-ch347-sheet

w3b-rek0n-cheat-sh337

h4cking-t00ls

de4l3r


  1. Day 1: Starting Booting 🥷 - https://loveisinthe.net/BLEACH.local-LAB/HCE%20-%20Day1_%20Starting%20booting.pdf

  2. Day 2: Not My Neighbor 🥷 - https://loveisinthe.net/BLEACH.local-LAB/HCE%20-%20Day2_%20Not%20my%20neighbour.pdf

  3. Day 3: Blessed Ignorance 🥷 - https://loveisinthe.net/BLEACH.local-LAB/HCE%20-%20Day3_%20Blessed%20ignorance.pdf

  4. Day 4: Sharpening Axes 🥷 - https://loveisinthe.net/BLEACH.local-LAB/HCE%20-%20Day4_%20Sharping%20axes.pdf

  5. Day 5: All Is in Mind 🥷 - https://loveisinthe.net/BLEACH.local-LAB/HCE%20-%20Day5_All%20is%20in%20mind.pdf

  6. Day 6: Untitled 🥷 - https://loveisinthe.net/BLEACH.local-LAB/HCE%20-%20Day6_Untitled.pdf

  7. Day 7: Malwarocalypse 🥷 - https://loveisinthe.net/BLEACH.local-LAB/HCE%20-%20Day7_Malwarocalypse.pdf

  8. Day 8: Are You Winning, Son? 🥷 - https://loveisinthe.net/BLEACH.local-LAB/HCE%20-%20Day8_Are%20you%20winning%20son%3F.pdf

  9. Day 9: Tick-Tac-Toe 🥷 - https://loveisinthe.net/BLEACH.local-LAB/HCE%20-%20Day9_Tick-Tac-Toe.pdf

  10. Day 10: Muddy Road 🥷 - https://loveisinthe.net/BLEACH.local-LAB/HCE%20-%20Day10_Muddy%20road.pdf


Welcome to the "Introduction to Active Directory Hacking" laboratory focused on BLEACH.local. In this session, we will delve into the intricate world of Active Directory (AD) security vulnerabilities and exploitation techniques. Active Directory serves as the backbone of many organizational networks, providing centralized management of users, computers, and resources. However, its complexity and criticality also make it a prime target for malicious actors seeking unauthorized access, data theft, or system compromise. During this hands-on laboratory, we will explore various attack vectors commonly exploited in AD environments. From password attacks leveraging weak credentials to sophisticated exploitation of system vulnerabilities, each technique represents a potential entry point for attackers.

Our scenario revolves around BLEACH.local, a fictitious but realistic AD environment. Through practical demonstrations and simulations, you will gain insights into the methodologies used by both attackers and security professionals to assess, mitigate, and defend against such threats. By the end of this session, you will have a deeper understanding of AD security fundamentals, practical exposure to common attack scenarios, and valuable insights into safeguarding AD infrastructures against real-world threats. Let's embark on this journey together to strengthen our knowledge and defenses against Active Directory vulnerabilities in the context of BLEACH.local.