Simulation Control

Scenarios
Legitimate Actions

Enumeration & Discovery

Initial Access & Credential Attacks

Exploitation of Known Vulnerabilities

Privilege Escalation

Lateral Movement

Certificate & PKI Attacks (AD CS)

Domain Compromise & Persistence

Legend
  • ๐Ÿ’พ DC
  • ๐Ÿ“œ CA
  • ๐Ÿ‘ค User
  • ๐Ÿ‘‘ Admin
  • โš™๏ธ Service Acct
  • ๐Ÿ’ป Workstation
  • ๐Ÿข Server
  • ๐Ÿ’€ Attacker

  • โ€”โ†’ Kerberos
  • โ€“โ€“โ†’ LDAP
  • ยทยทยทโ†’ DRSUAPI
  • ยทยทยทโ†’ RPC
  • โ€“โ€“โ†’ SMB
  • โ€“โ€“โ†’ NTLM
  • ยทยทยทโ†’ DNS
  • โ€”โ†’ HTTP(S)
  • โ€”โ†’ Attack Flow
Simulation Log