Thank you! As someone who's preparing for the oscp and struggling with windows privesc techniques, this really helps. Please upload more videos like these. 😀
These videos are so clean. Thanks for making them! On somewhat of a side note; what are some common ways to be able to start attacking AD, but from an external network starting point?
Thank you! If you're talking about an external standpoint, I'm going to assume the DC isn't accessible and you're only hitting targets in a DMV. In that case, password spraying or gaining a foothold on a domain joined machine in some way is going to be vital.
Yeah I meant DMZ, autocorrect lol. Those are both good ideas. And when doing this it's important to check the password lockout policy with a client to ensure you don't lock all the accounts out.
@@c0nd4 Gotcha! Yup, good advice. Feel free to lemme know if there's other good paths in. External assessments might be rather close to adversary simulation in some regards. Full attack chain from complete outsider with only access to some externally facing servers and OSINT, to eventually attempting DC takeover. Scary stuff
Do we need the SEBackupPrivilege script if we can already use Shadow Copies and mount to a new drive? We can just download the hives directly from x: ?
Hi, I'm new to the world of security administration, and I was hoping to get some guidance from someone with your expertise. Do you have any advice on mapping out a career path in this area?
9 місяців тому
i had a problem when i typed "evil-winrm -i -u Administrator -H ", i received "Error: An error of type WinRM::WinRMAuthorizationError happened, message is WinRM::WinRMAuthorizationError
Error: Exiting with code 1" Can you help me fix this? thank you!
Thank you! As someone who's preparing for the oscp and struggling with windows privesc techniques, this really helps.
Please upload more videos like these. 😀
Glad i can help! I do plan on continuing this series.
@William Frank yes it is!
@@nate8824 gotta love Near :)
Thanks Conda , you are doing an amazing work. Pls more videos like this.
Thank you!
Woah didn't know this technique! Thank you so much!
No problem! It's a fun one
You are amazing dude! 🌟
Thank you!
Can you make video about setting up metasploitable3 both ubuntu 14.04 and windows 2008 that uses a Vagrant and Packer?
These videos are so clean. Thanks for making them!
On somewhat of a side note; what are some common ways to be able to start attacking AD, but from an external network starting point?
Thank you! If you're talking about an external standpoint, I'm going to assume the DC isn't accessible and you're only hitting targets in a DMV. In that case, password spraying or gaining a foothold on a domain joined machine in some way is going to be vital.
@@c0nd4 Do you mean DMZ?
So would something like bruteforcing VPN and OWA credentials be a good idea?
Yeah I meant DMZ, autocorrect lol. Those are both good ideas. And when doing this it's important to check the password lockout policy with a client to ensure you don't lock all the accounts out.
@@c0nd4 Gotcha! Yup, good advice. Feel free to lemme know if there's other good paths in. External assessments might be rather close to adversary simulation in some regards.
Full attack chain from complete outsider with only access to some externally facing servers and OSINT, to eventually attempting DC takeover. Scary stuff
I'm adding user to backup operator but they can't access my shared folder if they are sitting in different location under domain
Really a explainer video, thanks
Thanks for the video
How do I undo the diskshadow copy? I would like to clean up after myself but struggle to figure it out
Absolutely brilliant.
Do we need the SEBackupPrivilege script if we can already use Shadow Copies and mount to a new drive? We can just download the hives directly from x: ?
Hi, I'm new to the world of security administration, and I was hoping to get some guidance from someone with your expertise. Do you have any advice on mapping out a career path in this area?
i had a problem when i typed "evil-winrm -i -u Administrator -H ", i received
"Error: An error of type WinRM::WinRMAuthorizationError happened, message is WinRM::WinRMAuthorizationError
Error: Exiting with code 1"
Can you help me fix this? thank you!
Highergrade, do this with an account with no remote logon access...
oooh I see you like deathcore ;)