Hacking Active Directory for Beginners

Hacking Active Directory for Beginners

The Cyber Mentor via YouTube Direct link

- SMB Relay Attacks Part 1

24 of 62

24 of 62

- SMB Relay Attacks Part 1

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Hacking Active Directory for Beginners

Automatically move to the next video in the Classroom when playback concludes

  1. 1 - Introduction
  2. 2 - Installing VMWare / VirtualBox
  3. 3 - Installing Linux
  4. 4 - Configuring VirtualBox
  5. 5 - Installing PMK
  6. 6 - Active Directory Overview
  7. 7 - Physical Active Directory Components
  8. 8 - Logical Active Directory Components
  9. 9 - AD Lab Overview
  10. 10 - Cloud Lab Alternative
  11. 11 - Downloading the Necessary ISOs
  12. 12 - Setting up the Domain Controller
  13. 13 - Setting Up the User Machines
  14. 14 - Setting Up Users, Groups, and Policies
  15. 15 - Joining Our Machines to the Domain
  16. 16 - Initial AD Attacks Overview
  17. 17 - LLMNR Poisoning Overview
  18. 18 - Capturing NTLMv2 Hashes with Responder
  19. 19 - Password Cracking with Hashcat
  20. 20 - LLMNR Poisoning Defenses
  21. 21 - SMB Relay Attacks Overview
  22. 22 - Quick Lab Update
  23. 23 - Discovering Hosts with SMB Signing Disabled
  24. 24 - SMB Relay Attacks Part 1
  25. 25 - SMB Relay Attacks Part 2
  26. 26 - SMB Relay Attack Defenses
  27. 27 - Gaining Shell Access
  28. 28 - IPv6 Attacks Overview
  29. 29 - Installing mitm6
  30. 30 - Setting up LDAPS
  31. 31 - IPv6 DNS Attacks
  32. 32 - IPv6 Attack Defenses
  33. 33 - Passback Attacks
  34. 34 - Other Attack Vectors and Strategies
  35. 35 - Post Compromise Enumeration Intro
  36. 36 - PowerView Overview
  37. 37 - Domain Enumeration with PowerView
  38. 38 - Bloodhound Overview
  39. 39 - Grabbing Data with Invoke Bloodhound
  40. 40 - Using Bloodhound to Review Domain Data
  41. 41 - Post-Compromise Attacks Intro
  42. 42 - Pass the Hash and Password Overview
  43. 43 - Installing crackmapexec
  44. 44 - Pass the Password Attacks
  45. 45 - Dumping Hashes with secretsdump
  46. 46 - Cracking NTLM Hashes with Hashcat
  47. 47 - Pass the Hash Attacks
  48. 48 - Pass Attack Mitigations
  49. 49 - Token Impersonation Overview
  50. 50 - Token Impersonation with Incognito
  51. 51 - Token Impersonation Mitigation
  52. 52 - Kerberoasting Overview
  53. 53 - Kerberoasting Walkthrough
  54. 54 - Kerberoasting Defenses
  55. 55 - GPP Password Attacks Overview
  56. 56 - Abusing GPP Part 1
  57. 57 - Abusing GPP Part 2
  58. 58 - URL File Attacks
  59. 59 - Mimikatz Overview
  60. 60 - Credential Dumping with Mimikatz
  61. 61 - Golden Ticket Attacks
  62. 62 - Conclusion

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.