
Network Security Assessment: Know Your Network.Hacking Exposed 7: Network Security Secrets and Solutions.The Hacker Playbook 2: Practical Guide To Penetration Testing.If you are completely unfamiliar with how a “ Grey Box” Penetration Test is carried out on a Network - along with the exploitation of Web Applications, daemons and services - then I highly suggest you get ahold of and read the following resources - as well as read the PTES Standards that I linked above.

With this information I was able to log into other devices, leverage exploits or logins further in the process, this also allowed me to easily pivot from machine to machine and gain deeper access to the network - to where I was finally able to take control of the Domain Controller. What does this mean? This means that I started by enumerating users, gaining emails, passwords, and any other network information that seemed useful to me. I closely followed the The Penetration Testing Execution Standard which aided me in compromising the next network segment or device from previously gained information. Each of my posts are in order of compromise which provided the best results and were the most logical. Please note, that there are 13 Tokens in total scattered throughout the lab. Today we will be covering the first steps taken to attack the lab - which will include the following: In my previous post “ Pentestit Lab v10 - Introduction & Network”, we covered the Network, and VPN Connection.
