hacker associate logo v2

Trellis

04 Feb 2023
Unleash the Potential of Active Directory Security with Trellis Penetration Testing Lab!
Unlock the Power of Active Directory with @Harshad Shah's New Penetration Testing Lab! With 15 years of cybersecurity expertise, he has created a cutting-edge lab that will take your AD security to the next level. Discover hidden vulnerabilities and strengthen your defense with hands-on, real-world testing. Get ready to secure your Active Directory like never before with Trellis lab. Enroll now and experience the ultimate AD security solution!

Lab Requirement

1.
VirtualBox: A virtualization software that will be used to create virtual machines for the lab environment.
2.
16GB RAM: A sufficient amount of memory to run multiple virtual machines concurrently.
3.
200GB Hard Disk: Adequate storage space to accommodate multiple virtual machines and software installations.
4.
Two Windows 10 Pro OS: Operating systems for two of the virtual machines that will be used as workstations in the lab.
5.
Kali Linux OS: The operating system for the virtual machine that will act as the attacker.
6.
Windows Server 2019: The operating system for the virtual machine that will act as the Domain Controller server.
7.
Email Server: A virtual machine or software that will be used to simulate an email server, to test the security of the company's email system.

What is Lab Trellis all about?

The Active Directory Penetration Testing Lab is a simulated environment that replicates a real-world scenario of a company named Trellis being compromised by hackers. The objective of this lab is to identify the possible attack factors and security loopholes in the company's network infrastructure.
Trellis is a successful company with three major networks - External, Internal, and Secure - that are responsible for different functions within the organization. The company has a Domain Controller server running on the Secure network with an IP address of 10.10.10.10(Dynamic), as well as two workstations named Workstation 1 and Workstation 2. Workstation 1 is connected to all three networks, while Workstation 2 is only connected to the Internal and Secure networks.
One day, Trellis discovered that their confidential information and sensitive data had been breached by hackers. The company realized that they needed to assess their security measures and identify the weaknesses in their network infrastructure that allowed the hackers to gain access.
That's where you come in as a penetration tester, tasked with simulating a real-world cyber attack on Trellis to uncover the security vulnerabilities and identify areas for improvement. By compromising the simulated network, you will be able to provide Trellis with actionable insights and recommendations for enhancing their security measures, helping to prevent similar attacks in the future.

What you will learn with Lab Trellis?

Get ready to boost your cybersecurity skills with our comprehensive lab Trellis. Learn about the crucial vulnerabilities and techniques to secure your network.
1.
Recon
2.
Active Directory Attack
3.
Service Exploitation
4.
Domain Exploitation
5.
Command and Control
6.
Lateral Movement
7.
Tunneling and Pivoting
8.
Firewall Bypass

How to start Lab Trellis?

"Unlock the Door to Success with Trellis Lab! Make Sure you have all the Requirements and Join the ORTP Training Program from Hacker Associate for Guaranteed Access (you must logged in). Can't wait? Join our @Discord Server and Request for Special Access Today!"