Parrot CTFs for Teams

Build cybersecurity talent.

An interactive and guided skills development platform for corporate teams looking to master offensive, defensive, and general security domains.

Parrot CTFs for Education

Empower the next generation.

Comprehensive cybersecurity education platform designed for academic institutions to prepare students for real-world challenges.

Parrot CTFs for Students

Start your cybersecurity journey.

Self-paced learning platform with hands-on labs and structured content to help you master cybersecurity skills.

Compliance-Focused Penetration Testing

NIS2 Compliance - Penetration Testing & Auditing

NIS2 Compliance

Parrot CTFs helps companies across Europe meet and maintain NIS2 compliance through trusted, transparent, and repeatable penetration testing. Get detailed audit-ready reports, real-world risk insights, and full lifecycle support.

Our NIS2 compliance solution includes:

  • Real-world risk insights
  • Full lifecycle support
  • Comprehensive penetration testing
  • Detailed audit-ready reports

Hacking Glossary

A comprehensive glossary of hacking terms and concepts.

Explore hacking terms

Hacking Cheat Sheets

A collection of cheat sheets for various hacking techniques and tools.

Hang out

Help Center

FAQs, and troubleshooting tips.

Visit Help Center

Introduction to Parrot CTFs

A guide to getting started with Parrot CTFs.

Read Guide

From the Blog
report

New release: The latest on CVE-2025-29927 – NextJS Vulnerability

21 Mar 2025, CVE-2025-29927 was made public by Next,js maintainers and this vulnerability can lead to Authentication bypass. This vulnerability is discovered by Rachid and Yasser Allam and possible to bypass authentication if they occur in middleware

View vulnerability report
Why Parrot CTFs?

Join our mission to create a safer cyber world by making cybersecurity training fun and accessible to everyone.

Get started with Parrot CTFs
Featured News

Level Up Your Active Directory Hacking: Parrot CTFs Now Hosts GOAD by Orange Cyberdefense

We’re proud to announce that Parrot CTFs now officially hosts GOADV3 developed by Orange Cyber Defense.

Read more news
Store
Free Trial

Start a free trial

Experience our enterprise solutions with a 14-day free trial.

Get started
Book Demo

Book a demo

Let us show you how Parrot CTFs can help your organization.

Book now
Products
Business

Products we offer

NIS2 Compliance

NIS2 Compliance

Parrot CTFs helps companies across Europe meet and maintain NIS2 compliance through trusted, transparent, and repeatable penetration testing. Get detailed audit-ready reports, real-world risk insights, and full lifecycle support.

Our NIS2 compliance solution includes:

  • Comprehensive penetration testing
  • Detailed audit-ready reports
  • Real-world risk insights
  • Full lifecycle support
Resources

Hacking Glossary

A comprehensive glossary of hacking terms and concepts.

Explore hacking terms

Hacking Cheat Sheets

A collection of cheat sheets for various hacking techniques and tools.

Hang out

Help Center

FAQs, and troubleshooting tips.

Visit Help Center

Introduction to Parrot CTFs

A guide to getting started with Parrot CTFs.

Read Guide

From the Blog
report

New release: The latest on CVE-2025-29927 – NextJS Vulnerability

21 Mar 2025, CVE-2025-29927 was made public by Next,js maintainers and this vulnerability can lead to Authentication bypass. This vulnerability is discovered by Rachid and Yasser Allam and possible to bypass authentication if they occur in middleware

View vulnerability report
Company
Why Parrot CTFs?

Join our mission to create a safer cyber world by making cybersecurity training fun and accessible to everyone.

Get started with Parrot CTFs
Featured News

Level Up Your Active Directory Hacking: Parrot CTFs Now Hosts GOAD by Orange Cyberdefense

We’re proud to announce that Parrot CTFs now officially hosts GOADV3 developed by Orange Cyber Defense.

Read more news
Store

Active Directory Hacking

Active Directory (AD) is a critical component in many enterprise networks, serving as the backbone for identity management, authentication, and authorization. However, due to its central role, it is also a prime target for attackers. In this comprehensive course on Active Directory Hacking, you will delve into the techniques and tools used by attackers to compromise AD environments. The course covers everything from the basics of Active Directory architecture to advanced exploitation techniques, including privilege escalation, lateral movement, and persistence.

General

Fundamentals

Parrot CTFs academy course image

What is Active Directory

Active Directory (AD) is a directory service developed by Microsoft for Windows domain networks. It is used to manage and organize resources in a networked environment, such as users, computers, printers, and other network objects. Here’s an overview of its key components and functionalities:

Key Components

  1. Domain: A logical grouping of network objects that share the same AD database. It provides centralized management and security. Each domain has its own set of policies, permissions, and authentication mechanisms.

  2. Domain Controller (DC): A server that holds a copy of the AD database and provides authentication and authorization services. Domain Controllers manage the domain and replicate data across other DCs within the same domain.

  3. Organizational Units (OUs): Containers within a domain that help organize and manage resources. OUs can be nested and used to delegate administrative control and apply Group Policies.

  4. Active Directory Users and Computers (ADUC): A Microsoft Management Console (MMC) snap-in used to manage users, groups, computers, and other objects within AD.

  5. Group Policy: A feature that allows administrators to define and control user and computer settings across the domain. Group Policies can enforce security settings, software installations, and other configurations.

  6. Global Catalog: A distributed data repository that contains a partial replica of all objects in the forest. It helps in searching for objects across domains and provides efficient authentication.

  7. Schema: Defines the types of objects and attributes that can be stored in AD. The schema is shared across all domains in a forest.

  8. Forest: A collection of one or more domains that share a common schema and global catalog. It represents the top-level boundary of an AD implementation.

Functionalities

  1. Authentication and Authorization: AD provides mechanisms for verifying user credentials and granting access to resources based on defined permissions.

  2. Centralized Management: Administrators can manage user accounts, computers, and security policies from a central location.

  3. Single Sign-On (SSO): Users can access multiple resources and services within the domain with a single set of credentials.

  4. Scalability and Replication: AD can scale to support large organizations and replicate data across multiple DCs to ensure high availability and consistency.

  5. Delegation of Control: Administrators can delegate specific administrative tasks to other users or groups, allowing for granular control and security.

Use Cases

  • User and Group Management: Creating and managing user accounts, groups, and permissions.
  • Policy Enforcement: Applying security and configuration policies across the organization.
  • Resource Access: Controlling access to network resources such as shared files and printers.

Active Directory is a crucial component for managing large-scale network environments, providing both security and administrative control.

Ready to start hacking?

Join Parrot CTFs and access our hands-on hacking labs today!