Whoami
search
⌘Ctrlk
Whoami
  • hand-waveWelcome
  • 🧪 Cybersecurity SOC Analyst Labs
    • shieldHome Lab: C2 Detection, Ransomware Defense & YARA Automation
    • message-botAutomation Lab - Home Project
    • chart-networkActive Directory Attack Lab: Recon-to-Root
      • Reconnaissance Phase
        • 1. Full TCP Port Scan on Target Host
        • 2. Service and Version Detection
        • 3. Null Session SMB Enumeration
        • 4. LDAP Anonymous Bind Check
        • 5. Kerberos Username Enumeration
        • 6. Password Brute Force via SMB Login
      • Exploitation Phase
    • magnifying-glassQRadar101 Lab Challenge
  • 🎨 Frontend Development Projects
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. 🧪 Cybersecurity SOC Analyst Labschevron-right
  2. chart-networkActive Directory Attack Lab: Recon-to-Root

Reconnaissance Phase

1. Full TCP Port Scan on Target Hostchevron-right2. Service and Version Detectionchevron-right3. Null Session SMB Enumerationchevron-right4. LDAP Anonymous Bind Checkchevron-right5. Kerberos Username Enumerationchevron-right6. Password Brute Force via SMB Loginchevron-right
PreviousActive Directory Attack Lab: Recon-to-Rootchevron-leftNext1. Full TCP Port Scan on Target Hostchevron-right