- Exercise 1: Reconnaissance
- Exercise 2: NTLM and Pass-the-Hash
- Exercise 3: Coerced Authentication and NTLM Relay
- Exercise 4: Kerberos Roasting
- Exercise 5: Kerberos Classic Delegation
- Exercise 6: Kerberos Ressource-based Constrained Delegation
- Exercise 7: ACL
- Exercise 8: Persistence