Group Policy Windows Active Directory Exploitation | TryHackMe VulnNet: Active

preview_player
Показать описание
In this video walkt-through, we covered enumerating a Redis No SQL database and exploiting print spooler service CVE-2021-34527 or what's called the PrintNightMare and group policy in Active Directory.
---
Room Link
----
Answers
--------
Receive Cyber Security Field Notes
-------
Patreon
Backup channel
My Movie channel:
------------
Рекомендации по теме
Комментарии
Автор

You have very clean and nice collection of notes. I really appreciate your hardwork.

ilyasessar
Автор

10:26 I was stucked to get NTLM hashes. I was stupid that I didn't mentioned any dir in redis eval part i.e. from the location where I was running responder.
Silly me. Thanks. This video was helpful. 👍👍

iakashx
Автор

Great video. Any idea if this use of Responder would be allowed on the OSCP exam? Apparently sniffing and spoofing is banned.

CyberCelt.
Автор

An Incredible video, but where can I get the notes?

taleen
Автор

how do you get the \DEsktop\Repo folder?

famisoul
Автор

Where is this Channel's membership section?

ilyasessar
Автор

How did you realese printnightmare ? I dont understand. You just say msrpc running on the machine so lets check imacket/rpcdump.py? Hoıw can you see the printnighmare? How How How???

farukmaruf