Setting up a local phishing lab in VMware using GoPhish, configuring a simple mail setup, and testing how campaigns and templates behave in a real Outlook client before moving into more advanced infrastructure.
Recon from unauthenticated and authenticated angles using techniques and tools such as Nmap, RPC/IIS fingerprinting, LDAP/WMI to locate MPs/DPs and exposed package artifacts.
Exploring SCCM’s collections, variables, task sequences, network access accounts, and PXE boot to understand the in-depth process behind deployment and operating system provisioning.