Completed
Why PowerShell
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Offensive Active Directory with PowerShell
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 Agenda
- 3 Why PowerShell
- 4 What is Active Directory
- 5 Why not use PowerShell
- 6 PowerView
- 7 Pipeline
- 8 Identifying and Hunting
- 9 Powershell Commandments
- 10 VOC User Hunter
- 11 Stealth User
- 12 Raw Data
- 13 Local Admin Enumeration
- 14 Local Group Enumeration
- 15 Process
- 16 GPO Abuse
- 17 Group Policy Preferences
- 18 Get GPP Password
- 19 Get Organizational Units
- 20 Group Policy Objects
- 21 Fine GPO Location
- 22 Active Directory CL
- 23 Active Directory ACL
- 24 Invoke ACL Scanner
- 25 Admin SD Holder
- 26 Downgrades
- 27 Power View
- 28 Domain Trust
- 29 Why Trust Matters
- 30 Trust Enumeration
- 31 Trust Mesh
- 32 Map Domain Trust
- 33 Domain Trust Explorer
- 34 CID histories
- 35 Golden Tickets
- 36 Kerberos
- 37 Trustpocalypse
- 38 Cheat Sheets
- 39 Credits
- 40 Questions