.. role:: html(raw)
:format: html
.. title:: MAAD Attack Framework
.. toctree::
:maxdepth: 2
:caption: MAAD Attack Framework (MAAD-AF)
:name: _maad_af
:hidden:
maad_af_intro/maad_af_intro
.. toctree::
:maxdepth: 2
:caption: MAAD-AF Lab - Getting Started
:name: _maad_af_getting_started
:hidden:
lab_getting_started/Lab_Getting_Started
.. toctree::
:maxdepth: 2
:caption: MAAD-AF - Testing
:name: _maad_af_modules
:hidden:
testing_1_initial_access/Testing_Initial_Access
testing_2_persistence/Testing_Persistence
testing_3_defense_evasion/Testing_Defense_Evasion
testing_4_collection/Testing_Collection
testing_5_exfiltration/Testing_Exfiltration
.. toctree::
:maxdepth: 2
:caption: MAAD-AF - Lab Completion
:name: _maad_af_lab_completion
:hidden:
lab_completion/Lab_Completion
.. toctree::
:maxdepth: 2
:caption: Reference
:name: _reference
:hidden:
.. _welcome:
--------------------------------
Welcome!
--------------------------------
.. figure:: ./images/MAAD_AF.png
:alt: MAAD-AF
MAAD-AF is an adversary emulation toolkit developed by Vectra AI to perform
simple, fast and effective security testing against an M365 and Azure AD
tenant.
About This Lab
===============
In this lab, you will:
- Set up & use MAAD-AF
- Learn the usage of the various modules within MAAD-AF
- Learn how to leverage MAAD-AF & red team in M365 POVs
- We want your time selling more, so this lab is designed to be completed under 60 mins, mostly.
How To Use This Lab
===================
- This is a hands-on lab designed to deliver a practical knowledge of attacker techniques and use of attack tools like MAAD-AF for security testing.
- Follow the instructions in each module to complete this lab. The modules are sequential so follow that.
- Each module may include some validation/checkpoint to vcerify completion. So be on a lookout for those.
- To successfully complete the lab, you will need to complete all the modules.