Attack Paths

In this section all attack paths are explained and divided in three sections; configuring, tasks and manual.

  • The configuring page links to each page that is required to configure the attack path.

  • The tasks page will contain a list of tasks that should be performed to exploit the attack path and will give a bit of guidance.

  • The manual page is a full manual on how to execute every attack and chain them together to takeover the whole domain,

Last updated