
Corporate Subnet Vulnerability Audit
Simulate a highly secure Blackbox penetration testing contract physically mapping an intricate virtual network. Exploit a legacy Windows Active Directory controller via precisely crafted payload vectors executing privilege escalation utilizing Metasploit.
Duration
8-10 weeks
Tasks
3
Difficulty
advanced
Learners
21
Project Strategist AI
Before writing a single line of code, let's architect the mental map of how we are going to conquer this Penetration Testing (Kali Linux) application.
What You'll Learn
By completing this project, you'll master these essential skills and concepts.
Master foundational Kali Linux architecture and operational excellence
Build, configure, and secure the corporate subnet vulnerability audit completely from scratch
Implement highly-available redundancy and strictly audited integration pipelines
Establish comprehensive system observability (logs, metrics, and alerts)
Technologies & Tools
You'll work with these modern technologies and frameworks.
Project Tasks
Complete these tasks to build the full project.
Nmap Subnet Enumeration
Scan absolutely every open port bypassing strict stealth firewalls utilizing fractional timing and decoy packets.
Payload Execution
Construct a tightly obfuscated reverse-TCP meterpreter executing strictly inside memory bypassing static Windows Defender signatures.
Active Directory Lateral Movement
Dump isolated NTLM credential hashes utilizing Mimikatz pivoting laterally across multiple machine terminals.
Project Information
Prerequisites
- ✓Solid understanding of programming fundamentals and data structures
Ready to Build?
Start with the first task and build your skills step by step. Each task builds upon the previous one.
Start Task 1: Nmap Subnet Enumeration →