Hacking Active Directory for Beginners

Hacking Active Directory for Beginners

The Cyber Mentor via YouTube Direct link

- Introduction

1 of 62

1 of 62

- Introduction

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Hacking Active Directory for Beginners

Automatically move to the next video in the Classroom when playback concludes

  1. 1 - Introduction
  2. 2 - Installing VMWare / VirtualBox
  3. 3 - Installing Linux
  4. 4 - Configuring VirtualBox
  5. 5 - Installing PMK
  6. 6 - Active Directory Overview
  7. 7 - Physical Active Directory Components
  8. 8 - Logical Active Directory Components
  9. 9 - AD Lab Overview
  10. 10 - Cloud Lab Alternative
  11. 11 - Downloading the Necessary ISOs
  12. 12 - Setting up the Domain Controller
  13. 13 - Setting Up the User Machines
  14. 14 - Setting Up Users, Groups, and Policies
  15. 15 - Joining Our Machines to the Domain
  16. 16 - Initial AD Attacks Overview
  17. 17 - LLMNR Poisoning Overview
  18. 18 - Capturing NTLMv2 Hashes with Responder
  19. 19 - Password Cracking with Hashcat
  20. 20 - LLMNR Poisoning Defenses
  21. 21 - SMB Relay Attacks Overview
  22. 22 - Quick Lab Update
  23. 23 - Discovering Hosts with SMB Signing Disabled
  24. 24 - SMB Relay Attacks Part 1
  25. 25 - SMB Relay Attacks Part 2
  26. 26 - SMB Relay Attack Defenses
  27. 27 - Gaining Shell Access
  28. 28 - IPv6 Attacks Overview
  29. 29 - Installing mitm6
  30. 30 - Setting up LDAPS
  31. 31 - IPv6 DNS Attacks
  32. 32 - IPv6 Attack Defenses
  33. 33 - Passback Attacks
  34. 34 - Other Attack Vectors and Strategies
  35. 35 - Post Compromise Enumeration Intro
  36. 36 - PowerView Overview
  37. 37 - Domain Enumeration with PowerView
  38. 38 - Bloodhound Overview
  39. 39 - Grabbing Data with Invoke Bloodhound
  40. 40 - Using Bloodhound to Review Domain Data
  41. 41 - Post-Compromise Attacks Intro
  42. 42 - Pass the Hash and Password Overview
  43. 43 - Installing crackmapexec
  44. 44 - Pass the Password Attacks
  45. 45 - Dumping Hashes with secretsdump
  46. 46 - Cracking NTLM Hashes with Hashcat
  47. 47 - Pass the Hash Attacks
  48. 48 - Pass Attack Mitigations
  49. 49 - Token Impersonation Overview
  50. 50 - Token Impersonation with Incognito
  51. 51 - Token Impersonation Mitigation
  52. 52 - Kerberoasting Overview
  53. 53 - Kerberoasting Walkthrough
  54. 54 - Kerberoasting Defenses
  55. 55 - GPP Password Attacks Overview
  56. 56 - Abusing GPP Part 1
  57. 57 - Abusing GPP Part 2
  58. 58 - URL File Attacks
  59. 59 - Mimikatz Overview
  60. 60 - Credential Dumping with Mimikatz
  61. 61 - Golden Ticket Attacks
  62. 62 - Conclusion

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.