Hi everyone,
So far so good, but right now, we are going to start with a new challenge, that represent the most common architecture that usually the companies implement for corporate domains solutions.
Using the following architecture we are going to implemts and exploit the most comon attacks types in order to compromise a "secure organization" CORPORATIVE.DOMAIN.local:
The previous image is the architecture base for our penetrationtesting personal lab. On the below section you'll find the configurations for every active of our "target company environment":
1. Full platform design up and running on the own local NAT Network, this kind of network, allow the guest servers, connect between theme inside a local subnet (172.0.9.x/24) and have access to internet:
IEX (new-object Net.webclient).downloadstring('https://raw.githubusercontent.com/f0ns1/powershell-pentest/main/os-recognition.ps1')
No comments:
Post a Comment