Discussing Active Directory & Internal Network Security

jh.live/threatreport || Conversations on network security and internal pentesting with James "Shikata" at IBM X-Force! We dig into misconfigurations, default weaknesses, and some great tradecraft and techniques. jh.live/x-force-yt
You can check out the full IBM X-Force Threat Intelligence Index report here jh.live/threatreport and learn more about IBM X-Force here: jh.live/x-force-yt
Learn Cybersecurity - Name Your Price Training with John Hammond: nameyourpricetraining.com
WATCH MORE:
Dark Web & Cybercrime Investigations: • Tracking Cybercrime on...
Malware & Hacker Tradecraft: • Malware Analysis & Thr...
📧JOIN MY NEWSLETTER ➡ jh.live/email
🙏SUPPORT THE CHANNEL ➡ jh.live/patreon
🤝 SPONSOR THE CHANNEL ➡ jh.live/sponsor
🌎FOLLOW ME EVERYWHERE ➡ jh.live/twitter ↔ jh.live/linkedin ↔ jh.live/discord ↔ jh.live/instagram ↔ jh.live/tiktok
💥 SEND ME MALWARE ➡ jh.live/malware
🔥KZread ALGORITHM ➡ Like, Comment, & Subscribe!

Пікірлер: 52

  • @jaggarhenry
    @jaggarhenryАй бұрын

    The best AD hacker by far. His workshop at DEFCON is gold.

  • @shikata_nai
    @shikata_naiАй бұрын

    Really was a pleasure coming on and doing an interview. I’ll make sure my headphone cable is untied next time lol. We should totally do some hands on demos together.

  • @rochanathaveesha8341

    @rochanathaveesha8341

    Ай бұрын

    You're a legend James! Looking forward to more content from you on AD and OT security.

  • @ScetheTrashworn

    @ScetheTrashworn

    Ай бұрын

    yoink

  • @chaeynz

    @chaeynz

    Ай бұрын

    Great talk shikeezee

  • @BLKMGK4

    @BLKMGK4

    Ай бұрын

    You really do nail some of the issues seen day in and out and did it well, thanks!

  • @Monkey_lol_
    @Monkey_lol_Ай бұрын

    the tangled up cord is tickling my OCD in all the wrong ways

  • @takshashilacorporate9787

    @takshashilacorporate9787

    Ай бұрын

    Why did you have had to point it out! Now, I can't get it out of my head!! ☹️😭😭

  • @Mauzy0x00

    @Mauzy0x00

    Ай бұрын

    Glad I’m not the only one 😂

  • @Mr0rris0

    @Mr0rris0

    Ай бұрын

    Goddamn ysmnaya

  • @joekellyou
    @joekellyouАй бұрын

    I’d love for either a three way or 2-part video with you two and a blue teamer. Show the default config getting pwned, then show the blue teamer fixing the config so the attack is stopped!

  • @fbifido2
    @fbifido2Ай бұрын

    Can you show and explain how to fully secure active directory plus all machine/services in that domain? - AD domain service - AD Certificate Service - Domain jointed devices (PC, Laptop, Servers, printers, etc..)

  • @wandererx86

    @wandererx86

    Ай бұрын

    That would be great

  • @joekellyou

    @joekellyou

    Ай бұрын

    I would imagine that video would have to be a live stream of a blue team just at work every day for the next 20 years 🤣

  • @seansingh4421

    @seansingh4421

    Ай бұрын

    Yubikey PIV or any HSM based secure key-value storage. That also protects against lsass.exe dumping exploits. Also strict Applocker policies, auditing logins, closing all unused network ports and using IDS or IPS. However using STIG and NIST based configurations would make your systems very secure but they could be very much pain in the ass. But yeah Applocker and network segmentation is a big one

  • @wandererx86

    @wandererx86

    Ай бұрын

    @@seansingh4421 very well-said

  • @tanq1687
    @tanq1687Ай бұрын

    Amazing interview John, very high quality guest! Keep these types of interview videos coming!

  • @IndyAdvant
    @IndyAdvantАй бұрын

    lol that tangled phone cable. brings me back

  • @Alfred-Neuman

    @Alfred-Neuman

    Ай бұрын

    That's pretty bad for my OCD! XD

  • @HyperDroids

    @HyperDroids

    Ай бұрын

    What makes it worse is that you know he affords better. 🤣

  • @hexsh
    @hexshАй бұрын

    love my boy Hammond, another amazing vid

  • @xCheddarB0b42x
    @xCheddarB0b42xАй бұрын

    The remarks on segmentation were eye opening. 👀

  • @DeNikow
    @DeNikowАй бұрын

    Really informative video! I'd like to see more of these and more technical.

  • @jordanbourcier2424
    @jordanbourcier2424Ай бұрын

    Great video! I think all IT pros should be required to watch this video

  • @onedrum13
    @onedrum13Ай бұрын

    I wonder what the raw video would be like, without all of the cuts. Interesting talk, very good points

  • @kriss777faith
    @kriss777faithАй бұрын

    Fantastic! Finally somebody said it, Jerry Maguire. Long background in utilities and gov enduring ancient insecure versions. Please expand!

  • @NickMaude
    @NickMaudeАй бұрын

    The convincing and planning of the changes needed, is tricky. And then there are the toes the feel they are stepped on by recommending the changes.

  • @HyperDroids
    @HyperDroidsАй бұрын

    This video was thoroughly interesting. Hope to see more of it in future. Great topics included relationship between NTLM Auth & Kerberos hashing (and dangers associated), EDR efficacy, ADCS, SMB hashing, LSASS, challenges corporate environments face with keeping their systems secure (theory vs practice), pentesting, OT segmentation, PCI compliance & segmentation, and so much more. Well worth watching for security professionals and any security conscious IT engineers.

  • @danktoaster257

    @danktoaster257

    Ай бұрын

    this is the most AI comment i've seen in awhile. hi gpt-o

  • @HyperDroids

    @HyperDroids

    Ай бұрын

    @@danktoaster257 Brother, then consider this comment as a CAPTCHA that helps retrain your AI detection software to reduce false-positives.

  • @ShinigamiAnger

    @ShinigamiAnger

    Ай бұрын

    ​@@HyperDroidslooks like what an AI would respond tbh

  • @LazyPlays_
    @LazyPlays_Ай бұрын

    can you do a video on the powershell malware that uses its built-in features to "live off the land"? you can get it from downloading cracked software, i wont comment it but i can tell u privately if you want. you know u have it by checking task scheduler in windows. look for edge or something like that or the file updates.ps1 or update.ps1 etc. it would be a good video and you can explain how to make powershell restricted, and disabled and how to remove most of the danger of it. EDIT: also this is one of the many reasons you should never use cracked software, not safe.

  • @DrorDvash
    @DrorDvashАй бұрын

    More of this guy please =) and go more deep into the hands-on side

  • @alaminiumar
    @alaminiumarАй бұрын

    Always good 🎉❤

  • @you_tube754
    @you_tube754Ай бұрын

    @John. Would you maybe consider make a long video about how a admin can protect the windows systems ? Say how to configure windows to be safe against hash collection and pass the hash. What gpo need te be in place ... Etc

  • @kickeddroid
    @kickeddroidАй бұрын

    The sad part is the reluctance for the industry to secure their shit. And I still can't get a cybersec job. Eternal Blue Really? Lmao

  • @KeithGriffiths
    @KeithGriffithsАй бұрын

    Good video John.

  • @batangx659
    @batangx659Ай бұрын

    JUICE! 😁

  • @user-lz7dc5ef2m
    @user-lz7dc5ef2mАй бұрын

    Sir number to ip ,fip ,address video please

  • @Redstoneprojrjr

    @Redstoneprojrjr

    Ай бұрын

    Please say the joking!

  • @glodydipanga
    @glodydipangaАй бұрын

    Hi John i need a mentorship for OSCP PLEASE

  • @smartsalmon1

    @smartsalmon1

    Ай бұрын

    When you sign up for the course you get access to offsec discord and OSA. You'll have a ton of support. Someone like John isn't going to have time to mentor you, and as a hacker you need to be able to be fairly autonomous as well

  • @henryhuevo
    @henryhuevoАй бұрын

    I'm just an internal pentester in a web pentesters world :(

  • @wendiriley3271
    @wendiriley3271Ай бұрын

    Can you do a video on an exploit chain for an android uefi rootkit? I might be able to get you a sample if I can dump it from flash. Context: I learned (as the victim) of an exploit chain for S22, S23, and s24 ultra phones - With no user interaction. That gets ROOT privellege shell acess, all while hiding behind, and not tripping knox. It involves accessibility services, for escalation, some recently "(emergency) patched" chrome zero days for initial access, "possibly?" Samsungs io_uring implementation for root access, and it seems to use a buffer overflow to install unsigned kernel modules for persistence. As well as attaching itself to your samsung AND google accounts for reinfection. Basically this thing is completely nuts, and has ruined 2 of my phones... (using my moms rn😂) I've been able to learn alot about how it works generally. But, I want to understand it better and see how you would analyze it or look through the exploit chain with your own process. As for the sample I'm getting set up with an EDL cable, and plan to write all partitions with random data before reformatting and reinstalling. I think thatll work

  • @NegussugeN
    @NegussugeNАй бұрын

    FFS that headphone cable.

  • @DarkSeas117
    @DarkSeas117Ай бұрын

    Who guys are all studying for jobs that dont exist

  • @kallikantzaros
    @kallikantzarosАй бұрын

    6:40 what was that all about LMAO

  • @thomcr
    @thomcrАй бұрын

    First

  • @hollywoodhank591

    @hollywoodhank591

    Ай бұрын

    First after the first :D

  • @fbifido2
    @fbifido2Ай бұрын

    how about show & tell ??? just taking about it is ok, but .....

  • @InfixLyrics
    @InfixLyricsАй бұрын

    1st comment :D like this if you're first ones.

  • @normal47712
    @normal47712Ай бұрын

    Need more nameyourpricetraining truly awsome and affordable please keep up the support for it