[Attack]tive Directory: Compromising a Network in 20 Minutes Through Active Directory

Поділитися
Вставка
  • Опубліковано 9 лис 2020

КОМЕНТАРІ • 20

  • @computerb0y27
    @computerb0y27 Місяць тому

    still relevant and good!

  • @devkaushik9618
    @devkaushik9618 2 місяці тому +1

    Learned a lot! Thanks

  • @0xbitbybit
    @0xbitbybit Рік тому +2

    Great talk and explanations!

  • @socat9311
    @socat9311 2 роки тому +7

    Great but cant see the projector screen, please show it in other presentations

  • @Tathamet
    @Tathamet 8 місяців тому +4

    Thanks I did not know Shroud knows INFOSEC!

  • @OSGoat
    @OSGoat 2 роки тому +2

    Awesome. Thats a good content for AD pentesting knowledge

  • @alexacohen12
    @alexacohen12 3 роки тому +8

    This is awesome! Thanks for the great content, I learned so much

  • @the_sandman00
    @the_sandman00 Рік тому +3

    If your devices are relying on LLMNR to communicate, they are already broken 😂

  • @benedictcharles
    @benedictcharles 3 роки тому +1

    I thought you cannot relay hash directly to the Domain Controller, since SMB signing is set to ON by default on DC. How is it you are showing it can be done here?

  • @dinlaurencebabia6578
    @dinlaurencebabia6578 7 місяців тому

    Can someone help? At 12:57, what does it mean if using FQDN to access something, it will break it?

    • @behindYOUR6
      @behindYOUR6 Місяць тому

      FQDN to access something refers to specifying the complete domain name for a resource, including the hostname and the domain suffix (e.g., hostname.example.com)
      "break it" is related to LLMNR. ( look at the example how he got the NTLM hash.
      break it means in local networks for name resolution when the DNS resolution fails, typically due to DNS server unavailability or misconfiguration. then the LLMNR coming up to play.
      try to google how FQDN & LLMNR related to each other.

  • @mdsathees3747
    @mdsathees3747 2 роки тому

    It would be great if you share the presentation slides here.

  • @RyanBess
    @RyanBess 3 роки тому

    With the wpad example were you able to crack the machine account? If so I’d like to see a video showing how that is accomplished in a reasonable amount of time. By default every 30 days Windows boxes change their password.

  • @jerryxie777
    @jerryxie777 Місяць тому

    So you really don't think anyone can totally understand kerberos will watch your video😂😅😊