How To Perform An Internal Pentest On Active Directory 2024 | Prep For Certs PJPT PNPT OSCP CRTP

preview_player
Показать описание
Join this channel to get access to perks:

#cybersecurity #hacker #activedirectory
How To Perform An Internal Pentest On Active Directory 2024 | Prep For Certs PJPT PNPT OSCP CRTP

Use Coupon Code INFOSECPAT for 10% off

Learn cybersecurity and hacking today with HTB links below.

Stay Protected online with NordVPN:
Nord Links

💸Support The Channel💸
___________________________________________
Please join as a member and help grow the channel. I would appreciate it so much and join the family.

📱Social Media📱

My Channel Is About Free IT Training And Cybersecurity Education, Lives With Others In The Field And So Much More :)
🔥HACK THE YOUTUBE ALGORITHM ➡ Like, Comment, Share & Subscribe!

Disclaimer:

All my videos are for learning and education purposes. Please always have permission to do an assessment on your target or client. I do all my videos in my home lab. I have full permission to my home network lab and VMs. Thank you and let's have fun learning together!
Рекомендации по теме
Комментарии
Автор

Thanks alot again! One day this will be like John Hammonds channel

timecopTwo
Автор

Hello! I got a question. I have virtual box configured with Active Directory and 2 workstations. I have Kali as my attack machine. The Questions is around Responder. Are you suppose to have the interface / nic card of the kali configured as a span port so Responder can see all traffic??? I have my VMs setup in Virtual box I can't see the workstation hash as it authenticates against the AD. BUT if I try to auth against the kali from the workstation responder will work and I see the hash. Am I doing something wrong?

ericmoore
Автор

"Most of the important things in the world have been accomplished by people who have kept on trying when there seemed to be no help at all." -Dale Carnegie

EARN--DAILY_JOB_FOR_U