How to Perform Windows Active Directory Penetration Testing | Cybeseclabs Secret

preview_player
Показать описание
In this video walkthrough, we demonstrated the steps taken to perform penetration testing for Windows machine with Active Directory installed. We escalated our privileges with Mimikatz and winrm.
******
Receive Cyber Security Field, Certifications Notes and Special Training Videos
Writeup
********
LinkedIn
Instagram
Twitter
Facebook
Рекомендации по теме
Комментарии
Автор

Sometimes I just don't understand your steps jumping from a point to another and cutting the video. I mean, smbclient gived 0 shares with your command, so why do you started to mount?

albertobarbieri
Автор

You just guessed that 172.31.1.4 had a mount point called "Office_Share"? That's not very realistic.

Passions
Автор

Motasim thank you for making cuberseclabs videos

saberkz
Автор

Very helpful sir, can you make more on active directory. Also enjoying playlist on this channel.

mr_tmat
Автор

There was a section you skipped, but i guess if you enter smbclient -L \\\\ ip.\\ it will give you the share folders...and then smbclient \\\\ ip \\ office_shares then it will give you the Lee Frank and Template etc🤷🏻‍♂️

phillydee
Автор

Hey Motassem, thank you so much for the video. Very nice. One thing I didn’t understand tho is why did you navigate to Jcakes to load mimikatz? Why didn’t you just load it from the Bdover user?

younesmohssen
Автор

OMG sir just checked your Linkedin profile :) can you guide me for OSCP exam like similar machines? I did PWK labs but only rooted 22 boxes, and I have also pass TjNull OSCP list, Can you suggest me more and some more things for future also :)

jck_dniels
Автор

good job bro like every time plz can you tell me where can I find the ps1 scripts !!

hamzaa
Автор

What is the software he is using for virtual machines

princeofdarkness