Тёмный

Retrieving Boot Images & Credentials | Breaching AD Part 3 

UserUpload
Подписаться 210
Просмотров 41
50% 1

🚀 Learn the Skills it takes to go from $0 to $500k per year with Cybersecurity and Hacking!
🔒 In our latest video, we covered NTLM Authentication in web applications 🌐💻
But guess what? We're taking it up a notch! 📈
Large organizations need tools to deploy and manage the infrastructure of the estate. In massive organizations, you can't have your IT personnel using DVDs or even USB Flash drives running around installing software on every single machine. Luckily, Microsoft already provides the tools required to manage the estate. However, we can exploit misconfigurations in these tools to also breach AD.
🌟Topics Covered
Intercepting NetNTLM Challenge
Relaying the Challenge
PXE Boot Image Retrieval
Recovering Credentials from a PXE Boot Image
recovering credentials from a centrally deployed application and more!

Опубликовано:

 

27 сен 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии    
Далее
OWASP Part 8. Insecure Deserialization
1:17:11
The Linux Experience
31:00
Просмотров 1 млн
Why Cybersecurity Training is a SCAM
10:37
Просмотров 177 тыс.
Fabric: The Best AI Prompts for Obsidian
11:02
Просмотров 1,3 тыс.
Hack The Box OSCP Prep - GRANNY
1:15:29
Просмотров 155
What is behind the Ctrl+Alt+Del emergency options?
11:58
Being Competent With Coding Is More Fun
11:13
Просмотров 79 тыс.
Why Are Open Source Alternatives So Bad?
13:06
Просмотров 642 тыс.
Nmap Basics for HACKERS
14:14
Просмотров 20 тыс.