Тёмный

How To Remove LLMNR and NBT-NS From Your Active Directory Environment 

Infinite Logins
Подписаться 11 тыс.
Просмотров 4,4 тыс.
50% 1

Опубликовано:

 

29 сен 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 17   
@notta3d
@notta3d Месяц назад
Great video. The million dollar question, by making these changes what possibly could break? It's fine in a lab but in production this question has to be asked. I know it has to be done, but management will want to know what impact this change could have on the environment? Will production systems, old and new, stop communicating? Thanks for the video.
@AliHussain-iz9wx
@AliHussain-iz9wx Год назад
From the demo im guessing not but Is there a need to disable mDNS aswell?
@Northcliffevassenger
@Northcliffevassenger 4 месяца назад
Thanks for demostrating the power of linux/ Active Directory vulnerabilities are one of the most common pitfalls in the actual networking envrionment.
@AlexAlex-ei7zf
@AlexAlex-ei7zf Месяц назад
Шалом, братан! Спасибо. Забыл за эту штуку. На Твое видео случайно наткнулся. Привет Тебе из Харькова
@Servietsky_
@Servietsky_ 4 месяца назад
U the goat, one more sub
@tshepisomotsoaledi6324
@tshepisomotsoaledi6324 3 года назад
Great tutorial, this is still an ongoing problem for organizations with legacy systems where they simply cannot afford to disable LLMNR and NBT-NS. Guess one of the mitigations action is to enforce a strong password policy standard say minimum of 16 characters to deter offline cracking.
@InfiniteLogins
@InfiniteLogins 3 года назад
Great point! I'd argue that the long-term plan is to get those legacy devices upgraded, and the short-term plan is to make sure they're isolated on their own networks without users logging into them. A strong password policy will help with the cracking aspect, but it doesn't prevent NTLMv2 Relay attacks unless SMB Signing is also enforced across the organization.
@tshepisomotsoaledi6324
@tshepisomotsoaledi6324 3 года назад
@@InfiniteLogins I agree with with you most definitely, I forgot to mention SMB Signing as another mitigation earlier. Oh by the way I enjoy your tutorials, keep up the good work and thank you.
@cimihan4816
@cimihan4816 3 года назад
Hy,I have my windows server in hyper-V. Right now I am practicing attack and defense in AD.I wanted to attack my lab misconfigurations from my system windows. How should I configure my server so that I should not have to installed another OS on hyper-V just for attacking(coz I don't have a powerful comp).
@InfiniteLogins
@InfiniteLogins 3 года назад
I'm sorry, I'm not sure I understand your question.
@cimihan4816
@cimihan4816 3 года назад
​@@InfiniteLogins Glad you replied.It's just that can I attack my windows server which is installed in hyper-v from my system os ? Like how do I do kerbroasting from my system windows to the server which is on hyper-v?
@lfernandorg
@lfernandorg 2 года назад
thanks for demonstrating using kali, that type of demonstrations gave me mo peace of mind, now I know that everything I have done worked properly
@InfiniteLogins
@InfiniteLogins 2 года назад
I'm glad this helped!
@CodeXND
@CodeXND 3 года назад
Cool
@waynewoolsey6422
@waynewoolsey6422 3 года назад
great video man
@pacman804
@pacman804 3 года назад
awesome 💯
Далее
Редакция. News: 136-я неделя
45:09
Просмотров 1,2 млн
LLMNR, NBT-NS, & mDNS Poisoning Attack
24:39
Hacking Windows TrustedInstaller (GOD MODE)
31:07
Просмотров 650 тыс.
MVPDays - Hardening Windows Server - Orin Thomas
28:16
Просмотров 4,5 тыс.
How I Became an Ethical Hacker / Pentester in 2020
22:00
Disable These 3 Windows Settings Now! (For Security)
12:26