Once the PenTest-er has identified their targets and researched potential vulnerabilities, they will begin attempting to exploit them. Depending on the type of resource, this may involve network‑based or host‑based attacks. The PenTest-er will also try to authenticate on the devices so they can navigate the system and carry out further attacks as needed.

<aside> <img src="/icons/target_red.svg" alt="/icons/target_red.svg" width="40px" />

Mission Objectives


1. Perform Network Attacks

Enterprise networks often rely on legacy protocols for compatibility, which can be exploited to intercept traffic or redirect users.

2. Perform Authentication Attacks

In an enterprise, the "Identity" is the most valuable target. We aim to steal or bypass credentials to gain access to the domain.

3. Perform Host-Based Attacks

Once access to a single host (Windows or Linux) is gained, the focus shifts to internal exploitation.