top of page
Windows Red Team Lab (CRTE)

Red Team Lab Objective:

Most enterprise networks today are managed using Windows Active Directory and it is imperative for a security professional to understand the threats to the Windows infrastructure. Our Windows Red Team Lab is designed to provide a platform for security professionals to understand, analyze and practice threats and attacks against a modern Windows network infrastructure. 

Our Windows Red Team lab simulates real world attack-defense scenarios and require you to start with a non-admin user account in the domain and work your way up to enterprise admin of multiple forests. The focus is on exploiting the variety of overlooked domain features and not just software vulnerabilities.

Windows Red Team Lab (CRTE)

This huge lab has multiple interesting tasks that are designed and built upon years of the author’s experience of red teaming windows environments. Every lab task is comprised of multiple challenges like active directory enumeration, local and forest privilege escalation, network pivoting, application allowlisting bypass, active user simulation, Kerberos delegation issues, SQL Servers, forest trusts, Azure hybrid identity and more! Whether you are a beginner, a seasoned red teamer, or a veteran blue teamer, the lab has something for everyone!
 

What will you Learn?

Windows Red Team Lab (CRTE)

The Windows Red Team Lab enables you to:

  • Practice various attacks in a fully patched real world Windows environment with Server 2019 and SQL Server 2017 machines.

  • Abuse Active Directory and Windows features like LAPS, gMSA, AD CS and more

  • Execute and visualize the attack path used by the modern adversaries.

  • Attack Azure AD Integration (Hybrid Identity).

  • Try new TTPs in a fully functional AD environment.

  • Understand defenses and their bypasses for (JEA, PAW, LAPS, Selective Authentication, Deception, App Allowlisting, Microsoft Defender for Identity etc.) 

The following are the prerequisites for the lab:

  • Basic understanding of red teaming/penetration testing or blue teaming/security administration of AD environment

  • Ability to think like an adversary and inclination towards abusing features of AD rather than exploits.

bottom of page