Тёмный

[Attack]tive Directory: Compromising a Network in 20 Minutes Through Active Directory 

SpecterOps
Подписаться 6 тыс.
Просмотров 29 тыс.
50% 1

Опубликовано:

 

29 сен 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 21   
@socat9311
@socat9311 2 года назад
Great but cant see the projector screen, please show it in other presentations
@dinlaurencebabia6578
@dinlaurencebabia6578 11 месяцев назад
Can someone help? At 12:57, what does it mean if using FQDN to access something, it will break it?
@behindYOUR6
@behindYOUR6 5 месяцев назад
FQDN to access something refers to specifying the complete domain name for a resource, including the hostname and the domain suffix (e.g., hostname.example.com) "break it" is related to LLMNR. ( look at the example how he got the NTLM hash. break it means in local networks for name resolution when the DNS resolution fails, typically due to DNS server unavailability or misconfiguration. then the LLMNR coming up to play. try to google how FQDN & LLMNR related to each other.
@SrRunsis
@SrRunsis 2 месяца назад
Awesome talk! There should be a 2024 version now
@the_sandman00
@the_sandman00 Год назад
If your devices are relying on LLMNR to communicate, they are already broken 😂
@alexacohen12
@alexacohen12 3 года назад
This is awesome! Thanks for the great content, I learned so much
@trustedsecurity6039
@trustedsecurity6039 2 года назад
it is very basic AD attacks ^^
@Tathamet
@Tathamet Год назад
Thanks I did not know Shroud knows INFOSEC!
@ajayghale2623
@ajayghale2623 Год назад
i swear i thot abt the same thing lol
@M4lch4t
@M4lch4t 10 месяцев назад
lol
@awecwec3720
@awecwec3720 7 месяцев назад
xdd
@_RaVeN33
@_RaVeN33 6 месяцев назад
😂 spot on
@OSGoat
@OSGoat 2 года назад
Awesome. Thats a good content for AD pentesting knowledge
@0xbitbybit
@0xbitbybit Год назад
Great talk and explanations!
@benedictcharles
@benedictcharles 3 года назад
I thought you cannot relay hash directly to the Domain Controller, since SMB signing is set to ON by default on DC. How is it you are showing it can be done here?
@devkaushik9618
@devkaushik9618 6 месяцев назад
Learned a lot! Thanks
@computerb0y27
@computerb0y27 5 месяцев назад
still relevant and good!
@jerryxie777
@jerryxie777 4 месяца назад
So you really don't think anyone can totally understand kerberos will watch your video😂😅😊
@mdsathees3747
@mdsathees3747 3 года назад
It would be great if you share the presentation slides here.
@RyanBess
@RyanBess 3 года назад
With the wpad example were you able to crack the machine account? If so I’d like to see a video showing how that is accomplished in a reasonable amount of time. By default every 30 days Windows boxes change their password.
Далее
Active Directory Training For Entry Level Help Desk
1:49:02
Windows Privilege Escalation for Beginners
3:11:45
Просмотров 102 тыс.
Network Security - Deep Dive Replay
3:08:19
Просмотров 160 тыс.
Hacking Active Directory
2:04:01
Просмотров 7 тыс.
Introduction to Domains
47:51
Просмотров 409 тыс.
pfSense Firewall - pfSense Administration Full Course
3:35:47
OTM-AICAMP_2024-09-26: Dean, Corey, Logan
2:33:45