Attack and Detection of Shadow Credentials

preview_player
Показать описание
How to Force a certificate into Active Directory and escalate to complete
Active Directory takeover. I will show how to detect the usage of overpass the hash and detect MSDSKeyCredential linkage to a domain controller computer account. Bonus, I do the entire demo with AV turned on using obfuscated versions of Rubeus and Mimikatz.

-~-~~-~~~-~~-~-
Please watch: "Red Team Tips February 1st: OPSEC Safe Active Directory Enumeration with SilentHound "
-~-~~-~~~-~~-~-
Рекомендации по теме
Комментарии
Автор

Just shared your channel with my team. Great Content! Would love to see some ADCS content if you have the time

shayarand
Автор

Great video. Do you have your obfuscated binaries available for use? I'd be interested in testing detection methods.

maxrand