Page cover image

🔥Assume Breach Execution Cycle

Discover comprehensive insights into the Assume Breach Execution Cycle in our in-depth article. Learn strategies, understand its implications and how it impacts cybersecurity.

CRTP - Assume Breach

CRTP Lab uses the methodology "Assume Breach", they provide us with a user account with low-level privileges, and the focus of the exam is after the Initial Comprise phase.

No phishing, no exploits, no CVEs - Let's Live Of The Land while breaching ADs.

Initial Access Granted

Upon starting the CRTP Lab's challenge, a low-level user account is already compromised. With the Initial Compromise phase out of the way, the real test of skill begins.

Mission Objective: Privilege Escalation

Using only native tools and resources, our task is to escalate privileges within the Active Directory environment. This environment mimics real-world networks, requiring careful maneuvering and a deep understanding of AD

Last updated

Was this helpful?