filmov
tv
Hacking Windows Domain Active Directory Series - Episode 01
![preview_player](https://i.ytimg.com/vi/owxF-d_6pJg/maxresdefault.jpg)
Показать описание
Be better than yesterday -
This video serves as the very first video into the Hacking Windows Domain Active Directory series, introducing the setup and configuration of the Windows domain environment that has been prepared for this series.
The goal of the series is to showcase various techniques, tactics, procedures, and also different tools that are useful in hacking a Windows domain Active Directory environment.
In this video, the following attack scenarios were covered:
- Password Spraying attack with CrackMapExec
- Initial Access with a domain user account
- Identifying viable attack path to perform lateral movement and privilege escalation with Bloodhound/Sharphound
- Network Pivoting with Metasploit/Meterpreter autoroute, socks_proxy, and also proxychains to support external toolings
- Lateral Movement with PsExec, including passing the hash (NTLM)
- Credentials dumping with Meterpreter Kiwi module (Mimikatz)
Feel free to suggest and request for specific techniques, tactics, or tools that you wish to see in the upcoming videos by commenting on the video below.
Free Udemy Course on Introduction to Phishing:
Looking to donate?
BTC: 19HiqQ2Qw83mxK9dcdoWb8VfAcsNgmp52k
Buy me a coffee!
DISCLAIMER:
All content posted on this Youtube channel is SOLELY FOR Educational and Awareness purposes ONLY. Any actions and/or activities related to the material presented in this Youtube channel is entirely YOUR responsibility.
We DO NOT promote, support, encourage any illegal activities such as hacking, and we WILL NOT BE HELD responsible in the event of any misuse and abuse of the content resulting in any criminal charges.
Here are the references used in the video, including useful references that should be given a read!:
Stay connected:
CrackMapExec:
PsExec:
Network Pivoting:
Bloodhound:
Windows ISO Files:
Setting up a Windows Domain Active Directory environment:
Support the channel!
Gemini Security Awesome Hacking T-Shirts:
Timestamp
00:00 Introduction to Hacking Windows Domain Active Directory Series
02:03 Attacking the Windows Domain AD Network - Initial Access
02:52 Exposed User List - Password Spraying Attack via CrackMapExec
04:58 Initial Access Obtained via RDP Access
05:20 Setting up remote shell access via Metasploit/Meterpreter
06:48 Bloodhound and SharpHound - Domain Enumeration
10:17 Analysing Bloodhound Graph for Privilege Escalation
12:18 Lateral Movement and Privilege Escalation to Domain Admin
16:12 Networking Pivoting with Autoroute, Socks Proxy, Proxy Chains
This video serves as the very first video into the Hacking Windows Domain Active Directory series, introducing the setup and configuration of the Windows domain environment that has been prepared for this series.
The goal of the series is to showcase various techniques, tactics, procedures, and also different tools that are useful in hacking a Windows domain Active Directory environment.
In this video, the following attack scenarios were covered:
- Password Spraying attack with CrackMapExec
- Initial Access with a domain user account
- Identifying viable attack path to perform lateral movement and privilege escalation with Bloodhound/Sharphound
- Network Pivoting with Metasploit/Meterpreter autoroute, socks_proxy, and also proxychains to support external toolings
- Lateral Movement with PsExec, including passing the hash (NTLM)
- Credentials dumping with Meterpreter Kiwi module (Mimikatz)
Feel free to suggest and request for specific techniques, tactics, or tools that you wish to see in the upcoming videos by commenting on the video below.
Free Udemy Course on Introduction to Phishing:
Looking to donate?
BTC: 19HiqQ2Qw83mxK9dcdoWb8VfAcsNgmp52k
Buy me a coffee!
DISCLAIMER:
All content posted on this Youtube channel is SOLELY FOR Educational and Awareness purposes ONLY. Any actions and/or activities related to the material presented in this Youtube channel is entirely YOUR responsibility.
We DO NOT promote, support, encourage any illegal activities such as hacking, and we WILL NOT BE HELD responsible in the event of any misuse and abuse of the content resulting in any criminal charges.
Here are the references used in the video, including useful references that should be given a read!:
Stay connected:
CrackMapExec:
PsExec:
Network Pivoting:
Bloodhound:
Windows ISO Files:
Setting up a Windows Domain Active Directory environment:
Support the channel!
Gemini Security Awesome Hacking T-Shirts:
Timestamp
00:00 Introduction to Hacking Windows Domain Active Directory Series
02:03 Attacking the Windows Domain AD Network - Initial Access
02:52 Exposed User List - Password Spraying Attack via CrackMapExec
04:58 Initial Access Obtained via RDP Access
05:20 Setting up remote shell access via Metasploit/Meterpreter
06:48 Bloodhound and SharpHound - Domain Enumeration
10:17 Analysing Bloodhound Graph for Privilege Escalation
12:18 Lateral Movement and Privilege Escalation to Domain Admin
16:12 Networking Pivoting with Autoroute, Socks Proxy, Proxy Chains
Комментарии