filmov
tv
Domain Persistence - Golden Certificate
Показать описание
Retrieving the CA certificate could allow a threat actor to forge and sign certificates for any domain user on the domain including domain machine accounts for domain persistence. The most critical machine account is the the one the belongs to the Domain Controller.
The forged certificate can then be used to request a Kerberos ticket from the KDC and utilize this ticket with pass the ticket on any host.
Using the DCSync technique the NTLM hash of the domain administrator can be retrieved which can be used with pass the hash to establish a session with the domain controller or via WMI.
The forged certificate can then be used to request a Kerberos ticket from the KDC and utilize this ticket with pass the ticket on any host.
Using the DCSync technique the NTLM hash of the domain administrator can be retrieved which can be used with pass the hash to establish a session with the domain controller or via WMI.
Domain Persistence - Golden Certificate
PowerShell for Pentesters - Golden Ticket Persistence
Domain Persistence: Detection, Triage, and Recovery
Certified Pre-Owned: Abusing Active Directory Certificate Services
Let the Children play - Leveraging ADCS for persistence in Parent-Child configured forests
Domain Persistence: Detection, Triage, and Recovery - Josh Prager & Nico Shyne [SO-CON 2024]
Hunting for Active Directory Persistence
ReCertifying Active Directory Certificate Services
Domain Persistence- Detection, Triage, and Recovery - Joshua Prager
When you first time install Kali linux for hacking 😄😄 #hacker #shorts
what it’s like to work at GOOGLE…
BSidesNYC 2024 - Detection and Triage of Domain Persistence
Hacking a Domain Controller
How Hackers Persist & Privesc in Microsoft 365
Red Vs. Blue: Modern Active Directory Attacks, Detection, And Protection
The resume structure that got me my dream job | Wonsulting
How to greet the interviewer? | Interview Tips
SANS Webcast: Dominating The Active Directory
SANS Webcast: Kerberos & Attacks 101
Top 6 Most Popular API Architecture Styles
Attack Tutorial: How Silver Ticket Attack Works
Persisting AD - Part 1 [Active Directory Hacking] -- TryHackMe LIVE!
My Cloud is APT's Cloud: Investigating and Defending Office 365
Watching The Watchdog: Protecting Kerberos Authentication With Network Monitoring
Комментарии