
This lesson requires Loopus Pro access. Upgrade to unlock all courses, labs, and challenges.
This advanced challenge simulates a corporate network penetration test. You will start with minimal information and work through network segmentation to achieve full domain compromise.
Client: Fictional Corporation
Access: External attacker perspective
Objective: Compromise the domain controller
The hidden network topology includes a firewall connected to DMZ with web and mail servers, internal network with clients and servers, and management network with domain controller.
Nmap for scanning, Metasploit for exploitation, Impacket for AD attacks, CrackMapExec for enumeration, Mimikatz for credential extraction.
External foothold 200 XP, Local admin access 300 XP, Lateral movement 400 XP, Domain admin 500 XP, DC compromise 600 XP.
90 minutes. Work efficiently and collect flags at each milestone.
What summarizes penetration results?
What distinguishes pentests from scans?
What step follows scanning?
What secures fixed vulnerabilities?
Found the flag? Submit it below to complete this lesson.
Format: LOOPUS{...}