Attacking Active Directory: Unleashing the Power of Unconstrained Delegation

preview_player
Показать описание
Delegation is a powerful feature in Active Directory, but it can also be a major security vulnerability if not configured properly. In this tutorial, we will show you step-by-step how to identify and exploit unconstrained delegation vulnerabilities in your Active Directory environment. We will cover the basics of how unconstrained delegation works, the potential risks, and how to use tools to detect and exploit these vulnerabilities.

JOIN MY DISCORD TO SHARE KNOWLEDGE AND EXPERIENCE
---------------------------------------------------

LINKS
---------------------------------------------------

FOLLOW ME
---------------------------------------------------

TIMESTAMPS
--------------------------------------------------
00:00 - Intro
00:25 - Configuring Client Side
01:37 - Configuring Server Side
02:38 - Enumeration and Exploitation
06:03 - Patch ideas
06:45 - Outro

red teaming 101
red team 101
red team
red teaming
hacking
ethical hacking
unconstrained delegation
kerberos delegation
kerberos exploit
delegation exploit
purple teaming
etw bypass
event tracing for windows
even tracing for windows bypass
etw
C2
hack discord
reverse shell
red teaming guide
hacking guide
red teaming tutorial
hacking tutorial
c2
command and control
hacking with discord
hacking c2
Рекомендации по теме
Комментарии
Автор

Just loved it guys need to be here for learning !

Dexterlex
Автор

Really educational! Thanks for sharing! Amazing content as always

bulhackacademy
Автор

Bro Rubeus will be cought by Windows Defender?

tanmoygoswami