[Attack]tive Directory: Compromising a Network in 20 Minutes Through Active Directory
Жүктеу.....
Пікірлер: 21
@SrRunsis12 күн бұрын
Awesome talk! There should be a 2024 version now
@0xbitbybit Жыл бұрын
Great talk and explanations!
@OSGoat2 жыл бұрын
Awesome. Thats a good content for AD pentesting knowledge
@alexacohen123 жыл бұрын
This is awesome! Thanks for the great content, I learned so much
@trustedsecurity6039
2 жыл бұрын
it is very basic AD attacks ^^
@Tathamet10 ай бұрын
Thanks I did not know Shroud knows INFOSEC!
@ajayghale2623
10 ай бұрын
i swear i thot abt the same thing lol
@M4lch4t
8 ай бұрын
lol
@awecwec3720
5 ай бұрын
xdd
@_RaVeN33
4 ай бұрын
😂 spot on
@devkaushik96184 ай бұрын
Learned a lot! Thanks
@socat93112 жыл бұрын
Great but cant see the projector screen, please show it in other presentations
@the_sandman00 Жыл бұрын
If your devices are relying on LLMNR to communicate, they are already broken 😂
@computerb0y273 ай бұрын
still relevant and good!
@benedictcharles3 жыл бұрын
I thought you cannot relay hash directly to the Domain Controller, since SMB signing is set to ON by default on DC. How is it you are showing it can be done here?
@dinlaurencebabia65789 ай бұрын
Can someone help? At 12:57, what does it mean if using FQDN to access something, it will break it?
@behindYOUR6
3 ай бұрын
FQDN to access something refers to specifying the complete domain name for a resource, including the hostname and the domain suffix (e.g., hostname.example.com) "break it" is related to LLMNR. ( look at the example how he got the NTLM hash. break it means in local networks for name resolution when the DNS resolution fails, typically due to DNS server unavailability or misconfiguration. then the LLMNR coming up to play. try to google how FQDN & LLMNR related to each other.
@mdsathees37473 жыл бұрын
It would be great if you share the presentation slides here.
@RyanBess3 жыл бұрын
With the wpad example were you able to crack the machine account? If so I’d like to see a video showing how that is accomplished in a reasonable amount of time. By default every 30 days Windows boxes change their password.
@jerryxie7772 ай бұрын
So you really don't think anyone can totally understand kerberos will watch your video😂😅😊
Пікірлер: 21
Awesome talk! There should be a 2024 version now
Great talk and explanations!
Awesome. Thats a good content for AD pentesting knowledge
This is awesome! Thanks for the great content, I learned so much
@trustedsecurity6039
2 жыл бұрын
it is very basic AD attacks ^^
Thanks I did not know Shroud knows INFOSEC!
@ajayghale2623
10 ай бұрын
i swear i thot abt the same thing lol
@M4lch4t
8 ай бұрын
lol
@awecwec3720
5 ай бұрын
xdd
@_RaVeN33
4 ай бұрын
😂 spot on
Learned a lot! Thanks
Great but cant see the projector screen, please show it in other presentations
If your devices are relying on LLMNR to communicate, they are already broken 😂
still relevant and good!
I thought you cannot relay hash directly to the Domain Controller, since SMB signing is set to ON by default on DC. How is it you are showing it can be done here?
Can someone help? At 12:57, what does it mean if using FQDN to access something, it will break it?
@behindYOUR6
3 ай бұрын
FQDN to access something refers to specifying the complete domain name for a resource, including the hostname and the domain suffix (e.g., hostname.example.com) "break it" is related to LLMNR. ( look at the example how he got the NTLM hash. break it means in local networks for name resolution when the DNS resolution fails, typically due to DNS server unavailability or misconfiguration. then the LLMNR coming up to play. try to google how FQDN & LLMNR related to each other.
It would be great if you share the presentation slides here.
With the wpad example were you able to crack the machine account? If so I’d like to see a video showing how that is accomplished in a reasonable amount of time. By default every 30 days Windows boxes change their password.
So you really don't think anyone can totally understand kerberos will watch your video😂😅😊