Global Central Bank An Enterprise Cyber Range | Pentester Academy


‪Global Central Bank An Enterprise Cyber Range | Pentester Academy
English | Size: 925.49 MB
Genre: eLearning

Global Central Bank (GCB) is a one of a kind Enterprise Windows and Active Directory Cyber Range. It helps enterprises test capabilities of both their Red and Blue teams in an Enterprise Windows network.

GCB is a true multi-forest environment that mimics a financial institution’s network. Teams can test cutting-edge TTPs as GCB is built completely on fully patched Server 2019 machines. It includes abuse or bypass of many recommended defence mechanisms LAPS, JEA, WSL, RBCD, WDAC, ASR, AWL, Credential Guard, CLM, virtualization and more. User simulation is used to make it a true enterprise network.

It is useful for both Red and Blue teams as very verbose logging is configured across the lab and teams can analyse the logs using the ELK installation in the labs.

GCB enables enterprises to simulate actual adversaries by focusing on goals rather than just getting privileged access to machines. For effective adversary simulation and exciting gamification, the end goal of GCB is to initiate a fake transfer of funds from the target bank.

GCB comes with a video course that covers the concepts required to challenge the lab. All students will be provided with 3 hours of video course material. This will be cover important concepts required to begin with the lab.

What will your learn?
GCB is ideal for:

Understanding and practicing current and futuristic threats.
Any TTP tested in GCB will be usable for years to come as it uses fully patched Server 2019 machines.
Sharpen your AD security skills by applying them to a unique multi-forest environment.
Understand that getting Domain Admin privileges is just the beginning of Enterprise compromise, even in Active Directory!
Testing lateral movement and domain dominance from a beachhead.
Abuse or bypass modern Windows features like LAPS, JEA, WSL, RBCD, WDAC, ASR, AWL, Credential Guard, CLM, virtualization and more.
Analyzing the adversary attack methodology using logs.
The following are the prerequisites for the lab:

Basic understanding of red teaming/penetration testing or blue teaming/security administration of AD environment
Ability to think like an adversary and inclination towards abusing features of AD rather than exploits.

Like a real world red team operation, GCB challenges your understanding of TTPs. With basic understanding of Enterprise security and Windows environment, you can crack the lab although we still expect GCB to be very challenging

nitroflare.com/view/C6D221895555A05/PA-Global-Central-Bank-An-Enterprise-Cyber-Range.9.6.part1.rar
nitroflare.com/view/703020F6F4DD19B/PA-Global-Central-Bank-An-Enterprise-Cyber-Range.9.6.part2.rar
nitroflare.com/view/79F28ACBFD62A95/PA-Global-Central-Bank-An-Enterprise-Cyber-Range.9.6.part3.rar
nitroflare.com/view/B46C264ABC7CD10/PA-Global-Central-Bank-An-Enterprise-Cyber-Range.9.6.part4.rar

rapidgator.net/file/58835f99ea36e74a9381f5940e85fff8/PA-Global-Central-Bank-An-Enterprise-Cyber-Range.9.6.part1.rar.html
rapidgator.net/file/549cf57e0b51e6f1a0bdff626aa7393d/PA-Global-Central-Bank-An-Enterprise-Cyber-Range.9.6.part2.rar.html
rapidgator.net/file/c7c3d1162ed8e3a3f1ae8ddda63bc096/PA-Global-Central-Bank-An-Enterprise-Cyber-Range.9.6.part3.rar.html
rapidgator.net/file/8397fcdfe8d70ce8a7e57c8b1d5c7900/PA-Global-Central-Bank-An-Enterprise-Cyber-Range.9.6.part4.rar.html

If any links die or problem unrar, send request to
forms.gle/e557HbjJ5vatekDV9

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.