Offensive Active Directory with PowerShell

Offensive Active Directory with PowerShell

WEareTROOPERS via YouTube Direct link

Why PowerShell

3 of 40

3 of 40

Why PowerShell

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Offensive Active Directory with PowerShell

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 Agenda
  3. 3 Why PowerShell
  4. 4 What is Active Directory
  5. 5 Why not use PowerShell
  6. 6 PowerView
  7. 7 Pipeline
  8. 8 Identifying and Hunting
  9. 9 Powershell Commandments
  10. 10 VOC User Hunter
  11. 11 Stealth User
  12. 12 Raw Data
  13. 13 Local Admin Enumeration
  14. 14 Local Group Enumeration
  15. 15 Process
  16. 16 GPO Abuse
  17. 17 Group Policy Preferences
  18. 18 Get GPP Password
  19. 19 Get Organizational Units
  20. 20 Group Policy Objects
  21. 21 Fine GPO Location
  22. 22 Active Directory CL
  23. 23 Active Directory ACL
  24. 24 Invoke ACL Scanner
  25. 25 Admin SD Holder
  26. 26 Downgrades
  27. 27 Power View
  28. 28 Domain Trust
  29. 29 Why Trust Matters
  30. 30 Trust Enumeration
  31. 31 Trust Mesh
  32. 32 Map Domain Trust
  33. 33 Domain Trust Explorer
  34. 34 CID histories
  35. 35 Golden Tickets
  36. 36 Kerberos
  37. 37 Trustpocalypse
  38. 38 Cheat Sheets
  39. 39 Credits
  40. 40 Questions

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.