- 3
- 1 853
Valentin Cain
Приєднався 24 бер 2021
IPv6 Takeover Attack
Part of my GitHub project - github.com/1984err/ActiveDirectoryHackingLab
mitm6
impacket
ntlmrelayx
python3
mitm6
impacket
ntlmrelayx
python3
Переглядів: 629
Відео
LLMNR, NBT-NS, & mDNS Poisoning Attack
Переглядів 6312 роки тому
Part of my GitHub project - github.com/1984err/ActiveDirectoryHackingLab Responder Python3 John The Ripper
Active Directory Hacking Lab Setup
Переглядів 5932 роки тому
Part of my GitHub project - github.com/1984err/ActiveDirectoryHackingLab Windows Server 2022 Windows 10 Enterprise
Great explain
effecient and super easy to follow tutorial, thanks man
Hello, bro! What you did will not successfully delete the problem. Also you should disable IGMP - it also is vulnerable. Bro, you living in a time of Chat GPT))) U should ask it about "How to disable mdns". And It will give U an answer. "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\DNSClient", create a parameter with the name of "EnableMulticast" and set a value to him as "0". Reboot a computer and u will get a result. Also as a variant U can make a virtual gate - firewall: install VirtualBox or something else. install on a VirtualBox Linux. Enable on this virtual machine ip_forward mode and set this virtual Linux as a gateway for windows. On a Linux - machine set iptables as on my example( input - drop, output - drop. Forward - as U need ) Sorry for probably bad english - it is only intermediate level and I wrote it without translater.
Got my sub with this video. Would really appreciate some help if possible. I'm stuck trying to create a user in my AD. I can get it to dump to the loot directory and view those files. I can add a computer to my server. I want to add a user. Also, I'd love to collab on some content creation if you're interested.
thank you