Cyberstruct logocyberstruct.io
Login
  • About
  • Campaigns
  • Blog
      • MITRE ATT&CK
      • Campaigns
      • CTF
  • Environments
    • comming soon
    • Support

      Logged in as:

    • Logout

    [ MITRE ATT&CK Stacks ]

    Advanced threat simulation


    Stacks in this section give you an effective way to practice MITRE ATT&CK TTPs through a high degree emulation of the target infrastructure. You get the real experience of an adversary. The scenarios are based on MITRE & ATTACK matrix. Learn more about stacks
    ss
    18 Exfiltration - 02
    18 Exfiltration - 02
    Beginner
    • Protocol Impersonation
    • Stealth Exfiltration
    • Stealth Exfiltration
    17 Discovery - Linux
    17 Discovery - Linux
    Beginner
    • Process Discovery
    • Threat Detection
    • Integrity Verification
    16 File Analysis - Linux
    16 File Analysis - Linux
    Beginner
    • File Analysis
    • Threat Detection
    • Integrity Verification
    15 Defense Evasion - Network
    15 Defense Evasion - Network
    Intermediate
    • Port Manipulation
    • Session Splicing
    • Payload Obfuscation
    • Route Manipulation
    14 Command & Control - Armitage
    14 Command & Control - Armitage
    Beginner
    • C2 Environment
    • Create and Manage Listeners
    • Perform Host Enumeration
    13 Credential Access - Password Cracking
    13 Credential Access - Password Cracking
    Beginner
    • Understand Hashes
    • Apply Unshadowing
    • Simulate an Attacker’s Approach
    12 Privilege Escalation - MySQL
    12 Privilege Escalation - MySQL
    Intermediate
    • Understand MySQL Vulnerabilities
    • Exploit Vulnerabilities with Metasploit
    • Simulate an Attacker’s Approach
    11 Initial Access - Wordpress
    11 Initial Access - Wordpress
    Beginner
    • Understand WordPress Vulnerabilities
    • Exploit Vulnerabilities with Metasploit
    • Simulate an Attacker’s Approach
    10 Persistence - Linux
    10 Persistence - Linux
    Beginner
    • Understand Persistence Mechanisms
    • Identify and Mitigate Unauthorized Access
    • Inject SSH Keys
    09 Execution - x86_64 Assembly
    09 Execution - x86_64 Assembly
    Beginner
    • Explore stack manipulation
    • Practice conditional branching
    08 Execution - buffer overflow
    08 Execution - buffer overflow
    Beginner
    • Enumeration and execution
    • Gain hands-on experience with industry-standard cybersecurity tools
    02 Reconnaissance - Passive
    02 Reconnaissance - Passive
    Beginner
    • Enumeration and reconnaissance
    • Gain hands-on experience with industry-standard cybersecurity tools
    07 Resource Development - 1
    07 Resource Development - 1
    Intermediate
    • Pentesting strategies and tactics
    • Enumeration and reconnaissance
    • Gain hands-on experience with industry-standard cybersecurity tools
    05 Reconnaissance - Target
    05 Reconnaissance - Target
    Intermediate
    • Pentesting strategies and tactics
    • Enumeration and reconnaissance
    • Gain hands-on experience with industry-standard cybersecurity tools
    04 Reconnaissance - OSINT
    04 Reconnaissance - OSINT
    Beginner
    • Enumeration and reconnaissance
    • Gain hands-on experience with industry-standard cybersecurity tools
    01 Networking 101
    01 Networking 101
    Beginner
    • Network Fundamentals
    • Reconnaissance
    03 Reconnaissance - Network
    03 Reconnaissance - Network
    Beginner
    • Pentesting strategies and tactics
    • Enumeration and reconnaissance