I put in place a real pentesting platform for you to pwn. No simulation, no regex, no sharing, you get 24-hour access to real machines with real flaws. Up to you to exploit them in a meaningful way without crashing the systems.
On the menu :
- Multiple windows machines in AD environment
- Local restrictions (applocker, GPO, etc.)
- Pivoting with some constraints (UAC, Firewall rules, etc.)