5-1-Local-Enumeration-with-Covenant-(10-44-)
5-2-Local-Enumeration-with-Metasploit-(6-19-)
5-3-AutoLogon-Misconfiguration-and-Exploitation-(6-55-)
5-4-AlwaysInstallElevated-Misconfiguration-and-Exploitation-with-Covenant-(6-30-)
5-5-AlwaysInstallElevated-Misconfiguration-with-Metasploit-(3-18-)
5-6-Fodhelper-UAC-Bypass-with-Covenant-(5-51-)
5-7-UAC-Bypass-with-Metasploit-(4-55-)
5-8-New-User-Persistence-(2-50-)
5-9-Startup-Persistence-(4-02-)
5-10-Autorun-Persistence-(5-55-)
5-11-Session-Passing-to-Metasploit,-SOCKS,-and-the-Autoroute-Module-(10-51-)
5-12-Persistence-via-RDP-(4-52-)
5-13-Workstation-Dominance-Part-1---Dumping-Hashes-with-Covenant-and-Mimikatz-(4-12-)
5-14-Workstation-Dominance-Part-2---Dumping-Hashes-with-Metasploit-(5-10-)
5-15-Workstation-Dominance-Part-3---Rulelist-Hash-Cracking-with-Hashcat-(4-36-)
5-16-Workstation-Dominance-Part-4---Cracking-the-Credential-Vault-with-Covenant-(10-59-)
5-17-Workstation-Dominance-Part-5---Cracking-the-Credential-Vault-via-Metasploit-(7-20-)
5-18-Workstation-Dominance-Part-6---Dumping-Firefox-Credentials-with-Metasploit-(7-29-)
Section 5 Lab Machine Requirements.txt