Completed
MS-RPC Calls
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Fun with LDAP and Kerberos - Attacking AD from Non-Windows Machines
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 Why this talk?
- 3 Takeaways
- 4 What is "Active Directory"?
- 5 Core AD Technologies
- 6 Working with AD Protocols
- 7 Find Active Directory through DNS
- 8 Domain Meta-Data Through LDAP
- 9 MS-RPC Calls
- 10 Communicating with MS-RPC
- 11 Impacket Binaries
- 12 Impacket Static Binaries
- 13 Active Directory uses LDAP
- 14 What does LDAP in AD look like?
- 15 Idapsearch - Computers
- 16 Nested Lookups
- 17 Nested Domain Admins
- 18 Admin-Count
- 19 Why do it manually?
- 20 LDAP Summary
- 21 Kerberos Crash-Course
- 22 What does Kerberos look like?
- 23 Kerberos and Authorization
- 24 Kerberos from Linux
- 25 Setting up Kerberos
- 26 Using Kerberos with GSSAPI
- 27 Viewing Kerberos Tickets
- 28 Using Kerberos with Impacket
- 29 When NTLM Auth is disabled
- 30 Password Spraying with SMB / RPC
- 31 Other Password Guessing Techniques
- 32 Password Guessing with Kerberos
- 33 What about logs?
- 34 Kerberos Event Logging
- 35 Requesting TGS for SPN
- 36 Cracking TGS Resp
- 37 Over Pass the Hash - AES
- 38 Forging Kerberos Tickets
- 39 Golden Ticket Creation
- 40 Golden Ticket Usage
- 41 Silver Ticket Creation
- 42 Silver Ticket Usage
- 43 Shoulders of Giants