.. role:: html(raw) :format: html .. title:: MAAD Attack Framework .. toctree:: :maxdepth: 2 :caption: MAAD Attack Framework (MAAD-AF) :name: _maad_af :hidden: maad_af_intro/maad_af_intro .. toctree:: :maxdepth: 2 :caption: MAAD-AF Lab - Getting Started :name: _maad_af_getting_started :hidden: lab_getting_started/Lab_Getting_Started .. toctree:: :maxdepth: 2 :caption: MAAD-AF - Testing :name: _maad_af_modules :hidden: testing_1_initial_access/Testing_Initial_Access testing_2_persistence/Testing_Persistence testing_3_defense_evasion/Testing_Defense_Evasion testing_4_collection/Testing_Collection testing_5_exfiltration/Testing_Exfiltration .. toctree:: :maxdepth: 2 :caption: MAAD-AF - Lab Completion :name: _maad_af_lab_completion :hidden: lab_completion/Lab_Completion .. toctree:: :maxdepth: 2 :caption: Reference :name: _reference :hidden: .. _welcome: -------------------------------- Welcome! -------------------------------- .. figure:: ./images/MAAD_AF.png :alt: MAAD-AF MAAD-AF is an adversary emulation toolkit developed by Vectra AI to perform simple, fast and effective security testing against an M365 and Azure AD tenant. About This Lab =============== In this lab, you will: - Set up & use MAAD-AF - Learn the usage of the various modules within MAAD-AF - Learn how to leverage MAAD-AF & red team in M365 POVs - We want your time selling more, so this lab is designed to be completed under 60 mins, mostly. How To Use This Lab =================== - This is a hands-on lab designed to deliver a practical knowledge of attacker techniques and use of attack tools like MAAD-AF for security testing. - Follow the instructions in each module to complete this lab. The modules are sequential so follow that. - Each module may include some validation/checkpoint to vcerify completion. So be on a lookout for those. - To successfully complete the lab, you will need to complete all the modules.