Windows Pentest Tutorial (Active Directory Game Over!)

Windows Pentest Tutorial (Active Directory Game Over!)

David Bombal

1 год назад

235,051 Просмотров

Ссылки и html тэги не поддерживаются


Комментарии:

@you_tube
@you_tube - 13.10.2023 21:10

@david what did the sysadmin did wrong in the installation of xammp?

Ответить
Bruno Zanone
Bruno Zanone - 10.10.2023 04:49

Muy bueno!

Ответить
George Mulak
George Mulak - 07.10.2023 22:19

WOW, very nicely done

Ответить
Zadok Nyamboga
Zadok Nyamboga - 01.10.2023 11:32

awesome presentation and demo. David and Remi

Ответить
Roy Eriksen
Roy Eriksen - 30.09.2023 15:58

Hi David. I find your videos very informational, and this one is so far "the best." Thanks for interviewing one of my country men. This presentation scares me :( Am for sure going to make a call to Remi

Ответить
iancaseydouglas
iancaseydouglas - 24.09.2023 06:42

Better to roll your own LSASS dumper.

Ответить
Phayul Digest
Phayul Digest - 10.09.2023 06:34

Thanks David & Remi, this is probably the best demo on AD hacking, I will watch this repeatedly until I get good grasp of AD hacking.

Ответить
Healthvative
Healthvative - 03.09.2023 07:46

Thanks David for a great channel. From Cyber security, hacking, pen testing, networking … all in one. Also thanks to Remi for the excellent demo

Ответить
Cyber Professional
Cyber Professional - 31.08.2023 21:21

Great stuff. Thanks @David for make this happen. I need to re-watch and take more notes. Thank you!!

Ответить
Amadeu Alexandre
Amadeu Alexandre - 30.08.2023 18:27

Good piece of information, it gives us great tips to protect ADs. Bring him for more topics maybe exploiting some Cloud IAMs (Azure AD, Okta etc)

Ответить
Vinicius Mucuge
Vinicius Mucuge - 29.08.2023 23:30

Amazing video and demo! One of the best explanations on Golden Ticket exploitation I've seen. Thanks

Ответить
John Wick
John Wick - 29.08.2023 08:33

Sheesh David, I appreciate the questions but who in their right mind would be attempting to pentest Windows without knowing the difference between Domain Admin and Local Admin.. lol. Sorry, I just feel like that kind of slows down the pace of the video.

GREAT video!!! Thank you for the content.

Ответить
flame boxx5
flame boxx5 - 28.08.2023 03:41

if I wasn't broke I'd tip this video but doesn't look like you would need it 🤑

Ответить
VacentViscera
VacentViscera - 25.08.2023 01:34

I watched this video and immediately went and checked like 20 files on various systems. LOL. Good wake-up for anyone that might not be thinking about these attacks.

Ответить
SHORTERKING
SHORTERKING - 16.08.2023 03:34

sophos antivirus always in the way brothers

Ответить
chillydill
chillydill - 15.08.2023 15:22

What a great video! Super interesting!

Ответить
NIGHT MARE
NIGHT MARE - 04.08.2023 07:18

Thank you very much for this sir.

Ответить
SilverBullet93GT
SilverBullet93GT - 01.08.2023 11:46

It's time to start renaming the Guest accounts to Jeff

Ответить
Mohamed Eladl
Mohamed Eladl - 29.07.2023 01:11

Mimikatz doesn’t work well on client machine without full privileges!

Ответить
A
A - 27.07.2023 19:27

How do we get these simulated labs to practice

Ответить
Joe Fawcett
Joe Fawcett - 25.07.2023 18:10

Brilliant video, and brilliant explanations all round. Just out of curiosity if a golden ticket file did fall into the wrong hands, would it be traceable to whoever created it?

Ответить
Muyang Li
Muyang Li - 24.07.2023 13:37

This vid is brilliant, Remy explained things so well and David you asked the questions popping right into my mind. Great job! Thanks!

Ответить
Hani Swaleh
Hani Swaleh - 17.07.2023 22:10

Eye opening video... Didn't know there is so many open holes in the active directory

Ответить
Trebor San
Trebor San - 15.07.2023 06:25

awesome sauce. Thank you!

Ответить
Mohamed Selim
Mohamed Selim - 15.07.2023 00:04

Really amazing

Ответить
Fergie
Fergie - 14.07.2023 07:10

Awesome Video, I'd love to see more like this!!

Ответить
Johnnie Parker
Johnnie Parker - 10.07.2023 21:21

Very indepth and intriguing video. I'd like to see Remy provide more explanations to OffSec practices and again, with he explanations.

Ответить
Sleia67
Sleia67 - 08.07.2023 05:01

What about caylx institute for isp?

Ответить
elmeromero303
elmeromero303 - 05.07.2023 08:37

High valuable content. Looking forward for more stuff like this. Thank you 👍

Ответить
Reckz
Reckz - 03.07.2023 22:11

GOLDEN TICKET of an explanation Remi was amazing

Ответить
David Robertson
David Robertson - 01.07.2023 17:02

Good stuff David - inside the mind of Remi ;)

Ответить
Bashar R
Bashar R - 29.06.2023 16:19

But you also need to tell people that pentesting AD environments is not that easy, it involves so much more than that, this is a very basic pentest that u can only find in CTF machine and very rare to see in a real life environments.

Ответить
Arcadiality
Arcadiality - 27.06.2023 12:25

This vid is a gem, and Remi is a breath of fresh air. Great explains along the way, but not too much to put off viewers with reasonable knowledge in some areas. More id definitely required from you guys if possible. Never change Remi, people who work with you must love it!!

Ответить
Luke Morley
Luke Morley - 26.06.2023 16:00

Great video.

Ответить
Barry Williams
Barry Williams - 26.06.2023 12:23

Thank you so much this is the video I have always been wanted the full pentest from initial access to lateral movement, escalation and persistence. Pretty much the whole package. Great stuff.

Ответить
Paul Scales
Paul Scales - 25.06.2023 22:42

Amazing, I have been sysadmin for a long time, this is scary stuff, I did notice antivirus was not enabled and would also need to be bypassed before mimikatz could be run, but as in all things that's a whole other video that probably should not see the light of day 😂

Ответить
Ricardo Ruivo
Ricardo Ruivo - 24.06.2023 00:35

Awesome video

Ответить
Roger Steele
Roger Steele - 23.06.2023 07:05

Great demo! Very informative for system administrators on things to look out for in the environment.

Ответить
ehsnils
ehsnils - 21.06.2023 21:05

The Kerberos ticket lifetime of 10 years explains some weirdness I encountered at work recently where the Kerberos ticked had expired for some accounts.

Ответить
ehsnils
ehsnils - 21.06.2023 20:51

If you penetrate a system and gain domain admin right - change the background image on every account with a nice little message.

Ответить
Raul Ceferli
Raul Ceferli - 21.06.2023 18:24

nice but that powershell command can't work in my laptop even i did everthing as he did

Ответить
Radomil Kmenta
Radomil Kmenta - 20.06.2023 13:55

@Rational Bushcraft I don't see a link to the commands either.

Ответить
soc dot
soc dot - 18.06.2023 16:34

Hello, hope you are doing good, please where is the command lines github page or source as you said before the start of the penstest, thank YOU.

Ответить
Kevorka
Kevorka - 17.06.2023 06:08

Right

Ответить
IT Department DVL Express
IT Department DVL Express - 16.06.2023 23:03

"muh names jeff" LMAO

Ответить
USS Hauler
USS Hauler - 16.06.2023 03:14

Really great video and full of good information. I appreciate you both for taking the time to explain this and upload this video, thank you !!!

Ответить
DIGANTA KONER
DIGANTA KONER - 15.06.2023 18:12

I have a question- Agreed that user credentials were stolen and rdp is being used now. But how do we get into the network? Unless we get into the corp network there is no way rdp would work. Or am I missing something?

Ответить
Hamid S
Hamid S - 15.06.2023 06:55

"my name is Jeff" 🤣
this tutorial was amazing. So how do you protect against these attacks? solution?

Ответить