top of page
Attacking Active Directory with Linux (LinuxAD)

Attacking Active Directory with Linux Lab Objective:

Attacking Active Directory with Linux (LinuxAD) is a training environment and playground. Students get access to dedicated lab setup (not shared with other students).

The lab contains a Linux based machine to execute attacks and a target AD setup. The target AD is a fully patched AD environment with all Server 2019 machines.

Students can practice techniques like network discovery, enumeration, abusing file shares, bypassing AMSI and Windows Defender, metasploit payloads, domain enumeration, credentials spraying and reuse, extracting secrets, testing LOLBAS, evading application whitelisting, SQL Server abuse, pivoting, ACL abuse, exploiting delegation, domain privilege escalation and more!

Attacking Active Directory with Linux (LinuxAD)

There are 30 flags to capture across various categories. The flags help in further understanding key concepts like credentials storage in Windows, local privilege escalation, application whitelisting enumeration, extracting secrets from SQL Server, WMI permanent events, manipulating windows firewall etc.

What's Included

Red Team Lab, Red Team Certifications, Red Team Trainings, Azure Pentesting, Azure Security
  • Access to a lab environment (35 hours to be spent in one month) with Server 2019 machines. Lab can be accessed using a web browser. 

  • 6+ hours of video course

  • Course slides

  • Lab manual

  • Walk-through videos

What will you Learn?

Attacking Active Directory with Linux (LinuxAD)

The LinuxAD lab enables you to:

  • Understand and practice the basics of attacking Active Directory using metasploit and other tools.

  • Understand how to approach attacking Windows Server 2019 machines.

  • Practice popular tools to understand the techniques they implement.

  • Learn to execute memory-only attacks from Linux against Windows machines.

The following are the prerequisites for the lab:

  • Basic familiarity with Linux command line

  • Basic understanding of information security concepts

Purchase On Demand Lab

35 hours for 30 Days



Terms of Purchase and Use:

  • You get 35 hours of total lab time which must be used within 30 days

  • You need a Google account to access the lab portal

  • Your 30 days subscription will start within 24 hours of purchase once you receive a confirmation email

  • Purchase includes access to the videos and lab manual

  • Every student gets a dedicated lab environment that is not shared with other students

linux ad purchase
bottom of page