# Darth Sidious

![](https://www.designerd.com.br/wp-content/uploads/2014/07/8.png)

**The goal is simple**\
To share my modest knowledge about hacking Windows systems. This is commonly refered to as red team exercises. This book however, is also very concerned with the blue team; the defenders. That is, helping those who are working as defenders, analysts and security experts to build secure Active Directory environments and monitor them for malicious activity.

**There are three major parts in this book**\
1\. Building a lab\
2\. Hacking it\
3\. Defending it

I have structured this book so it can be followed more or less sequentally. To practice many of these things, a lab is necessary. That is why I have made a few guides on how to build a lab, with varying degrees of comprehensiveness and size.

## Getting started

[GETTING STARTED](https://hunter2.gitbook.io/darthsidious/getting-started/getting-started)

## Getting the Source Code

The source for this book is available in the [book's github repository](https://github.com/chryzsh/DarthSidious).

## Changelog

| Date       | Who            | What                                                                                                                                                                                |
| ---------- | -------------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- |
| May 2017   | chryzsh        | Book created                                                                                                                                                                        |
| March 2018 | chryzsh        | Restructured book                                                                                                                                                                   |
| 30.03.2018 | bufferov3rride | Added article [Pivoting Through Exchange](https://hunter2.gitbook.io/darthsidious/initial-access/initial-access-through-exchange)                                                   |
| 02.04.2018 | chryzsh        | Restructured book again and removed some unfinished articles                                                                                                                        |
| 11.04.2018 | chryzsh        | Added the article [Building a malware analysis lab](https://github.com/chryzsh/DarthSidious/tree/fdd707cf9dbbc2faf3cf3dbbcd712b06fceeee87/labs/labs/cuckoo-malware-analysis-lab.md) |
| 14.04.2018 | chryzsh        | Added the article [Password cracking and auditing](https://hunter2.gitbook.io/darthsidious/credential-access/password-cracking-and-auditing)                                        |
| 23.04.2018 | filippos       | Added the article [CrackMapExec](https://hunter2.gitbook.io/darthsidious/execution/crackmapexec)                                                                                    |
| 06.05.2018 | chryzsh        | Fixed a link messup and some restructuring                                                                                                                                          |

Questions/Suggestions: Ping me on Twitter [@chryzsh](https://twitter.com/chryzsh)


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://hunter2.gitbook.io/darthsidious/master.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
