Fruits of Learning
Ctrlk
  • Overview
  • Tools & Cheatsheets
  • Hacking Methodology
  • Hands-on Practice
  • Changelog
  • Courses
    • πŸ“¦Hack The Box
    • πŸ•΄οΈOffSec
      • 🦊EXP-301
      • πŸ™EXP-312
      • βš“IR-200
      • πŸ‰PEN-103
      • 🐲PEN-200
      • πŸ›œPEN-210
      • πŸ”—PEN-300
        • Module 1: Evasion Techniques and Breaching Defenses: General Course Information
        • Module 2: Operating System and Programming Theory
        • Module 3: Client Side Code Execution With Office
        • Module 4: Phishing with Microsoft Office
        • Module 5: Client Side Code Execution With Windows Script Host
        • Module 6: Reflective PowerShell
        • Module 7: Process Injection and Migration
        • Module 8: Introduction to Antivirus Evasion
        • Module 9: Advanced Antivirus Evasion
        • Module 10: Application Whitelisting
        • Module 11: Bypassing Network Filters
        • Module 12: Linux Post-Exploitation
        • Module 13: Kiosk Breakouts
        • Module 14: Windows Credentials
        • Module 15: Windows Lateral Movement
        • Module 16: Linux Lateral Movement
        • Module 17: Microsoft SQL Attacks
        • Module 18: Active Directory Exploitation
        • Module 19: Attacking Active Directory
        • Module 20: Combining the Pieces
        • Module 21: Trying Harder: The Labs
      • βš›οΈSEC-100
      • πŸ›‘οΈSOC-200
      • TH-200
      • πŸ¦‰WEB-200
      • πŸ•·οΈWEB-300
    • πŸ’ΈSANS
    • πŸ›‘οΈSecurity Blue Team
Powered by GitBook
On this page
Edit
  1. Courses
  2. πŸ•΄οΈOffSec
  3. πŸ”—PEN-300

Module 21: Trying Harder: The Labs

PreviousModule 20: Combining the PiecesNextSEC-100