Further reading
The following resources for further study will help you dive deeper into the attacks covered in the chapter:
- Splunk Attack Range – https://github.com/splunk/attack_range
- Orange Cyberdefense GOADv2 – https://github.com/Orange-Cyberdefense/GOAD
- Deploy GOADv2 on Proxmox – https://mayfly277.github.io/categories/proxmox/
- DetectionLab project – https://www.detectionlab.network/
- Active Directory kill chain diagram – https://github.com/infosecn1nja/AD-Attack-Defense
- Red team infrastructure wiki – https://github.com/bluscreenofjeff/Red-Team-Infrastructure-Wiki
- EDR bypass team – https://dispatch.redteams.fyi/red-team-edr-bypass-team/
- Assume breach model – https://www.redsiege.com/wp-content/uploads/2019/09/AssumedBreach-ABM.pdf
- Mind map to assess the security of Exchange Server – https://github.com/Orange-Cyberdefense/arsenal/blob/master/mindmap/Pentesting_MS_Exchange_Server_on_the_Perimeter...