Hacking Windows Domain Active Directory Series - Episode 01

preview_player
Показать описание
Be better than yesterday -

This video serves as the very first video into the Hacking Windows Domain Active Directory series, introducing the setup and configuration of the Windows domain environment that has been prepared for this series.

The goal of the series is to showcase various techniques, tactics, procedures, and also different tools that are useful in hacking a Windows domain Active Directory environment.

In this video, the following attack scenarios were covered:
- Password Spraying attack with CrackMapExec
- Initial Access with a domain user account
- Identifying viable attack path to perform lateral movement and privilege escalation with Bloodhound/Sharphound
- Network Pivoting with Metasploit/Meterpreter autoroute, socks_proxy, and also proxychains to support external toolings
- Lateral Movement with PsExec, including passing the hash (NTLM)
- Credentials dumping with Meterpreter Kiwi module (Mimikatz)

Feel free to suggest and request for specific techniques, tactics, or tools that you wish to see in the upcoming videos by commenting on the video below.

Free Udemy Course on Introduction to Phishing:

Looking to donate?
BTC: 19HiqQ2Qw83mxK9dcdoWb8VfAcsNgmp52k

Buy me a coffee!

DISCLAIMER:
All content posted on this Youtube channel is SOLELY FOR Educational and Awareness purposes ONLY. Any actions and/or activities related to the material presented in this Youtube channel is entirely YOUR responsibility.

We DO NOT promote, support, encourage any illegal activities such as hacking, and we WILL NOT BE HELD responsible in the event of any misuse and abuse of the content resulting in any criminal charges.

Here are the references used in the video, including useful references that should be given a read!:

Stay connected:

CrackMapExec:

PsExec:

Network Pivoting:

Bloodhound:

Windows ISO Files:

Setting up a Windows Domain Active Directory environment:

Support the channel!
Gemini Security Awesome Hacking T-Shirts:

Timestamp
00:00 Introduction to Hacking Windows Domain Active Directory Series
02:03 Attacking the Windows Domain AD Network - Initial Access
02:52 Exposed User List - Password Spraying Attack via CrackMapExec
04:58 Initial Access Obtained via RDP Access
05:20 Setting up remote shell access via Metasploit/Meterpreter
06:48 Bloodhound and SharpHound - Domain Enumeration
10:17 Analysing Bloodhound Graph for Privilege Escalation
12:18 Lateral Movement and Privilege Escalation to Domain Admin
16:12 Networking Pivoting with Autoroute, Socks Proxy, Proxy Chains
Рекомендации по теме
Комментарии
Автор

I really enjoyed this series. well explained, well put together. Just overall superb. Would definitely like if you would put together a series more similar to this in future explaining how one can utilise bloodhound effectively for Domain enumeration. Well put together! really enjoyed this video.

CHRISTIVN.OFFICIAL
Автор

really enjoyed seeing realistic impacket smb trial and error, nano frozen due to huge powershell file, and how you looked for an alternative to make it works

wolfrevokcats
Автор

will this work for windows 11, windows server 2022? Because I can't seem to get it work.

SnachAgar
Автор

wow I like this content thank you very much bro 😎 keep it up you are a crack and super explained quality content 🤩🙏

nhoxxz
Автор

I love your contents.
I wanna stay in touch.
Practicing cybersecurity in West Africa.
We really got some vunerable systems. Would like to work with you to revolutionize that shortfall

babayega
Автор

I love your videos bro…so informative Thanks for the information..❤ Just one suggestion bro please change the background music put something powerful…

Mohitkumar-ugjq
Автор

Just found your channel, liked it already. Your accent sounds familiar

Btw, room for improvement. 3:02 maybe you can make the font size bigger, just like John Hammond always do. Really helpful as I watch youtube via phone

Anyway, you're doing a very good job. Keep it up

wolfrevokcats
Автор

I'm a newb with sublime text. how did you format the users with it?

jarmeh