• Exercise 1: Dumping and Cracking SAM Hashes to Extract Plaintext Passwords
  • Exercise 4: Exploiting Client Side Vulnerabilities and Establishing a VNC Session
  • Exercise 5: Escalating Privileges by Exploiting Client Side Vulnerabilities
  • Exercise 6: Hacking Windows 10 using Metasploit, and Post-Exploitation Using Meterpreter
  • Exercise 15: Hacking Windows Server 2012 with a Malicious Office Document Using TheFatRat
  • **Exercise 16: Active Online Attack using Responder *(*LLMNR/NBT-NS Spoofing attack on a network using Responder.py)