[Attack]tive Directory: Compromising a Network in 20 Minutes Through Active Directory

preview_player
Показать описание

Рекомендации по теме
Комментарии
Автор

Awesome talk! There should be a 2024 version now

SrRunsis
Автор

Awesome. Thats a good content for AD pentesting knowledge

OSGoat
Автор

Thanks I did not know Shroud knows INFOSEC!

Tathamet
Автор

This is awesome! Thanks for the great content, I learned so much

alexacohen
Автор

Great but cant see the projector screen, please show it in other presentations

socat
Автор

If your devices are relying on LLMNR to communicate, they are already broken 😂

the_sandman
Автор

I thought you cannot relay hash directly to the Domain Controller, since SMB signing is set to ON by default on DC. How is it you are showing it can be done here?

benedictcharles
Автор

Can someone help? At 12:57, what does it mean if using FQDN to access something, it will break it?

dinlaurencebabia
Автор

It would be great if you share the presentation slides here.

mdsathees
Автор

With the wpad example were you able to crack the machine account? If so I’d like to see a video showing how that is accomplished in a reasonable amount of time. By default every 30 days Windows boxes change their password.

RyanBess
Автор

So you really don't think anyone can totally understand kerberos will watch your video😂😅😊

jerryxie