Completed
Summary
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Evading Microsoft ATA for Active Directory Domination
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 About Me
- 3 Agenda
- 4 What is ATA
- 5 How it works
- 6 Lab Configuration
- 7 Threat Detection
- 8 User Hunting
- 9 SP and Scanning
- 10 Evading ATA with Power View
- 11 Brute Force
- 12 EType
- 13 AES Keys
- 14 Over Pasta Hash Detection
- 15 Fake Events
- 16 Golden Ticket Attack
- 17 Golden Ticket Downgrade
- 18 Lifetime Based Detection
- 19 Constrainted Delegation
- 20 Not Detected
- 21 No Use
- 22 No Detection
- 23 Kerberos
- 24 Sequel Servers
- 25 Interactions
- 26 Espeon Scanning
- 27 LDAP IPSec ESB
- 28 Attacking Microsoft ATA
- 29 MongoDB
- 30 Change Alert Identity
- 31 Set Alert Visibility
- 32 Defenses
- 33 Avoiding ATA
- 34 Limitations
- 35 ATA Team
- 36 Summary
- 37 Conclusion