BRUTEFORCING DOMAIN PASSWORDS (AD #05)

Поділитися
Вставка
  • Опубліковано 8 лис 2024

КОМЕНТАРІ • 91

  • @_JohnHammond
    @_JohnHammond  2 роки тому +6

    HUGE THANKS to Snyk for sponsoring this video & supporting the channel! Check out Snyk to help bake security into your development process, find and fix vulnerabilities before the bad actors do! snyk.co/johnhammond

    • @_JohnHammond
      @_JohnHammond  2 роки тому +3

      @Not Convinced Of course! You need to know the adversary you are up against ;)

    • @passaronegro349
      @passaronegro349 2 роки тому

      🇧🇷✨ here in Brazil we follow your channel.

    • @passaronegro349
      @passaronegro349 2 роки тому

      @@_JohnHammond Brazilians can buy the courses ???

  • @TheHopeless72
    @TheHopeless72 2 роки тому +3

    Hey John! I'm 22 and i've been learning coding, languages, hacking and all that sweet stuff since i was a kid.
    The way you explain things in your videos really helped me understand a lot more in a short period of time instead of just opening a terminal doing the ole trial and error OR watching videos where they don't explain anything at all, type in a lot of code at once and say "voila its done now you've learned".
    What i'm trying to say is thank you so much for helping me and other people learn all these cool stuff while having fun and experimenting, you're literally the best teacher one could have...
    Note: Apologies if i made any grammar mistakes, i'm Turkish

  • @j-makkk5208
    @j-makkk5208 2 роки тому +56

    Hey John would you consider setting up some blue team tools and then after the series is over showing us how we could track our self's through the network and stuff like that

    • @_JohnHammond
      @_JohnHammond  2 роки тому +45

      Yes ;)

    • @j-makkk5208
      @j-makkk5208 2 роки тому

      Awesome can't wait

    • @frosecold
      @frosecold 2 роки тому

      Hey, I want in!

    • @peacejon2019
      @peacejon2019 2 роки тому

      Where's my Notepad?

    • @mds570
      @mds570 2 роки тому

      Thats an amazing idea! Exactly what I want to learn! John please, kind sir! 😄

  • @d00b3rt
    @d00b3rt 2 роки тому +5

    My favorite pentest tool! Would recommend adding a plug to account lockouts. Locking out a domain is never a good Monday

    • @ianm.2088
      @ianm.2088 2 роки тому

      Absolutely! Enumerate the password policy of the network, or check with your contact for your IPT to make sure you don't lock out every user on the domain by password spraying.

  • @georgemukiu8835
    @georgemukiu8835 2 роки тому +1

    Interesting, this keeps me wondering on how to detect its usage on my network.

  • @Tirandus
    @Tirandus 2 роки тому +9

    That was awesome and frightening at the same time. So much info from just a normal user account 😱

  • @UKvideos2009
    @UKvideos2009 2 роки тому

    Man I had so much fun on this one, the setting up of the AD and such was fiddly but this made it worth it!

  • @lumin0l161
    @lumin0l161 Рік тому

    Absolutely top notch video and video series John. Thanks so much for making these, you've really taught me so much over the years :)

  • @rusirumunasinghe4129
    @rusirumunasinghe4129 2 роки тому

    Loving this series so far and looking forward to the next video!

  • @Sabyas_Hub
    @Sabyas_Hub 2 роки тому +5

    John makes Hacking noob friendly.

  • @rabidmoose01
    @rabidmoose01 2 роки тому +1

    Not sure if this was pointed out, but if you iterate through each line in users.txt, you can run crackmapexec on each iteration without the continue on success flag and pipe that output through grep.
    eg while read user; do cme stuff -u $user -p passwords.txt | grep '[+]'; done < users.txt

  • @TheH2OWeb
    @TheH2OWeb 2 роки тому

    Great video as always John ! Thank you !!!

  • @pwerd
    @pwerd 2 роки тому

    John, keep up the great work! These videos are a godsend.

  • @HopliteSecurity
    @HopliteSecurity 2 роки тому

    This was fantastic. Please keep up the amazing work!

  • @imranthoufeeque
    @imranthoufeeque 2 роки тому +1

    Its super awesome but hope that this series will not gonna stop just like other ones 😅

  • @efiita7554
    @efiita7554 2 роки тому

    thanks john! great content as always...

  • @Raza_9798
    @Raza_9798 2 роки тому +2

    Hey all. I'm here from sri lanka

  • @astech.4u
    @astech.4u 2 роки тому

    Love from India ❣️

  • @AngelMetzTutoriales
    @AngelMetzTutoriales 2 роки тому +1

    At minute 18:00 you did not get information from the ports and SMB in ws01 machine because possibly the windows 11 firewall was blocking you

  • @markfuentes3666
    @markfuentes3666 2 роки тому

    Love it

  • @liradavid1
    @liradavid1 2 роки тому

    That wasn't a long video. But a great video.

  • @cocosloan3748
    @cocosloan3748 2 роки тому

    Amazing as always

  • @baconlover1158
    @baconlover1158 2 роки тому

    one of the best and maybe you are the best

  • @netanel135
    @netanel135 2 роки тому

    You are awesome

  • @scott8964
    @scott8964 2 роки тому

    Could you please do a video step by step showing us how to set up linux on a Windows computer so it is easy to use follow as in 100%anonymous for us to use to start learning Linux ie chinging or IP address if possible love these videos please don't stop making them

  • @vhje9754
    @vhje9754 2 роки тому +2

    hello from the netherlands

  • @thepioneer517
    @thepioneer517 2 роки тому

    cool great series to learn how to come from Zero to Hero ... please never ends ;-)

  • @hamedranaee5641
    @hamedranaee5641 2 роки тому

    You are the real one 💪

  • @amiramiry6910
    @amiramiry6910 2 роки тому +2

    Sheeesh this is interesting

  • @jasonirvin6782
    @jasonirvin6782 2 роки тому

    I cant like anymore because its perfectly balanced at 666! Very Nice !

  • @prikshatkeinth
    @prikshatkeinth 2 роки тому

    thx work

  • @like_a_boss8262
    @like_a_boss8262 2 роки тому

    You love to see it

  • @kenGPT
    @kenGPT 2 роки тому

    21:16 9 lines from the bottom 😉

  • @PhrostyGaming
    @PhrostyGaming 2 роки тому +1

    How does this prevent the "lockout after 3 attempts" policy?

  • @ArSiddharth
    @ArSiddharth 2 роки тому

    Hello from India

  • @ricseeds4835
    @ricseeds4835 2 роки тому

    Great stuff as always but did I miss the part where you find the DC IP address as someone who didn't set up the lab?

    • @lordmummie
      @lordmummie 2 роки тому +1

      You could find the DC by using nmap and looking at the open ports

  • @utensilapparatus8692
    @utensilapparatus8692 2 роки тому

    🖇 John the Ripper!

  • @suryaroja03
    @suryaroja03 2 роки тому

    Thankyou

  • @monstroPT
    @monstroPT 2 роки тому

    @john could you share what's the hardware on which you're spawning all the VMs?
    The behemoth that you mentioned a couple of videos back.

  • @stswebhusesele5626
    @stswebhusesele5626 2 роки тому

    As MCSA expired, which certificate would you recommend that has the same content as MCSA?

  • @Semtx552
    @Semtx552 2 роки тому

    My appetite has been wetted, thanks!
    i will replay this attack in my lab env, but with "Defender for Identitiy" active. see how it is detected.

    • @dandk_
      @dandk_ 2 роки тому +1

      whetted ;p

  • @sandra8139
    @sandra8139 2 роки тому

    I find that the cyber security app is working better than the try to hack site it is like Ben made it of me and I am the real Sandra Mulligan of Australia

  • @YEAHPLAYGAE
    @YEAHPLAYGAE 2 роки тому +2

    Can you show us your terminator config?

    • @MiguelDevOps
      @MiguelDevOps 2 роки тому

      He has a video talking about his config in terminator

  • @sandra8139
    @sandra8139 2 роки тому

    so you can see the malware lookout security app is

  • @snwtoy
    @snwtoy 2 роки тому

    Appreciate the content, but what kind of a n00b configures a domain with no lockout policy for x password fails in y minutes? It's interesting to see the tool, but in reality you could do all the the exact same things with a few lines of powershell, even from a *nix machine.

  • @larrymoose15
    @larrymoose15 2 роки тому +1

    I didn't understand why there was no limit on login attempts. Wouldn't that be a problem in real cases?

    • @anthonybyrne2262
      @anthonybyrne2262 2 роки тому

      I downloaded the latest Win2022 server iso today and installed it and I was wondering the same thing.
      It seems that by default, group policy sets the account lockout mechanism to "Not configured". If you want to rate limit the sysadmin will need to change the group policy.

  • @cryptosimsihc
    @cryptosimsihc 2 роки тому

    master what is your eye icon on your top of your phone? on your other episode video. i watching your content when im stress. your video is stress relief sometimes for me. i home you can do episode that what best application that we can use to prevent for hackers or virus. I'm using vpn and anti virus what is you think? thankyou and advance i hope you can help us to protect our personal life. thankyou so much. :)

  • @rayxfinkle8328
    @rayxfinkle8328 2 роки тому

    I'm curious if once it establishes what the password policy is, if it only tries words in the password list that fit the password policy. Or if it still checks every password whether or not it complies.

  • @pppp9459
    @pppp9459 2 роки тому

    I would love to understand and follow you but i couldn't. It went to fast for me unfortunately

  • @francescofrullano
    @francescofrullano 2 роки тому

    why you don´t use wsl you can launch instaces of kali from windows start menu

  • @notta3d
    @notta3d 2 роки тому +1

    Is this actually trying the user name and password combos? if so wouldn't this lock out the account? Also, do the AD controllers log these attempts?

    • @lmaoroflcopter
      @lmaoroflcopter 2 роки тому +1

      Yes. Yes - but if you were spraying, you'd usually configure it to stay under the lockout threshold limit for an account.
      Event 4625.
      However, if you just straight up monitor this on any reasonably sized network, you'll be absolutely smashed with people derping their creds legitimately.
      Try instead monitoring for attempts for x different accounts from a single host. It might be normal to see 4624 events (services use user accounts) and maybe the odd misconfiguration resulting in 1 or 2 4625's regularly across the IT estate, but its unlikely to be normal to see say 4 different 4625's from a single host.
      That way you'll identify an actual spray, eliminating the noise and someone using cme on your network should in theory light up like a Christmas tree.
      *this obviously is only one method of spraying. Kerbrute, etc may result in different event IDs (e.g. 4771)

  • @guilherme5094
    @guilherme5094 2 роки тому

    👍

  • @finthefail9599
    @finthefail9599 2 роки тому

    let's hack the youtube algorithm

  • @NicholasMarkovich
    @NicholasMarkovich 2 роки тому

    Is it just me or is the audio slightly ahead of the video in this?

  • @Exodiiac
    @Exodiiac 2 роки тому +1

    Hey john it looks cool but not very practical. Usually after 5 failed attempts the account gets locked out. Spamming password till you hit something will just lock users out of their systems

    • @anthonybyrne2262
      @anthonybyrne2262 2 роки тому +2

      It seems that by default, group policy sets the account lockout mechanism to "Not configured". A sysadmin will need to change the group policy manually to set a rate limit so you might find yourself lucky. Alternatively, you could try password spraying accross all users instead of 1. I.E. instead of try 5000 passwords on 1 account, try the 4 most common passwords accross 5000 account (assuming your client organisation is a large enough entity). If they are a small enterprise youre really just more likely that the default is set!

  • @Xbotto
    @Xbotto Рік тому

    its porketta btw, not porscietta

  • @maelteprah123
    @maelteprah123 2 роки тому

  • @LinuxJedi
    @LinuxJedi 2 роки тому

    that shit never worked on virtualbox in windows i tried like 12 times at least and then i would try to boot to the OS but the grub menu never popped up and it never booted to the login screen

  • @bhagyalakshmi1053
    @bhagyalakshmi1053 Рік тому

    Password files is colors red

  • @sandra8139
    @sandra8139 2 роки тому

    I unsubscribed and don't even use lookout security I been in UA-cam the whole time

  • @entertainment6030
    @entertainment6030 2 роки тому

    Add Arabic translation

  • @hassanaziz171
    @hassanaziz171 2 роки тому

    Donnelle Raeburn they have a free trial version

  • @MantisSTS
    @MantisSTS 2 роки тому

    Regarding the OSINT (LinkedIn stuff) I do have a script that uses Selenium to scrape the LinkedIn users and generate an email list if anyone is interested.

  • @ngongasionasiona6584
    @ngongasionasiona6584 Рік тому +1

    Hey John would you consider setting up some blue team tools and then after the series is over showing us how we could track our self's through the network and stuff like that

  • @ngongasionasiona6584
    @ngongasionasiona6584 3 місяці тому

    Hey John would you consider setting up some blue team tools and then after the series is over showing us how we could track our self's through the network and stuff like that