That's how it ends, with the #CRTO certificate. One of he best courses I attended so far!
So it began, the journey to #CRTO
Got in some practice "pillaging" DPAPI. Next, more lateral movement practice. #CRTO #GetSmart
Phishing bit worked. Need to rework the persistence. First crack didn't work as expected. #CRTO #GetSmart #PracticeMakesPerfect

We are thrilled to announce that #AdversaryWars #AdversaryVillageCTF at @defcon 31 has secured a Gold sponsorship from Zero-Point Security and RastaMouse, the creator of the awesome #CRTO #RedTeamOps #AdversarySimulation course.
We extend our heartfelt gratitude to #ZeroPointSecurity and Rasta for their unwavering support to the #AdversaryVillage community.

For more information, please visit our webpage: https://adversaryvillage.org/adversary-events/DEFCON-31/
Learn more about Zero-Point Security training: https://training.zeropointsecurity.co.uk

#PurpleTeam #BreachSimulation #BAS #AdversaryTactics #DEFCON31 #AdversaryEmulation #AdversaryMindset #AdversaryTradecraft #CTF #AdversaryWarsCTF #DEFCON

Adversary Village CTF at DEF CON 31

Adversary Village is a community torqued combat readiness platform purely focuses on Adversary simulation, emulation tactics, APT emulation, Simulation CTFs, Adversary Tactics, life, urban survival skills and purple teaming.

#hack100days Day 10. Back to #CRTO and the lab. More initial compromise and some host enumeration. #RedTeam #CobaltStrike
#hack100days Day 8. More time on #CRTO, finally got into the lab and worked on the Initial Compromise section. Got acquainted with [[https://github.com/dafthack/MailSniper|Mailsniper]]. (Reckon its utility is shrinking as OWA and Exchange install bases shrink.)
Cleared my #CRTO Red Team Operator exam this week from Zero Point Security. Great course and exam experience!
#hack100days Day 7. Spent more time on extending #CobaltStrike section of #CRTO. Grokking Aggressor Scripts are CS client extensions. Looked harder at Beacon Object Files, not sure if that's going to be important for the test, though. Found https://github.com/CCob/BOF.NET as a way to pull in some .Net, but it's not yet obvious to me how that works. Regardless. Must. Hit. The. Lab.
GitHub - CCob/BOF.NET: A .NET Runtime for Cobalt Strike's Beacon Object Files

A .NET Runtime for Cobalt Strike's Beacon Object Files - GitHub - CCob/BOF.NET: A .NET Runtime for Cobalt Strike's Beacon Object Files

GitHub