NTLM Relay, Token Impersonation, Pass the Hash, PsExec, and More

NTLM Relay, Token Impersonation, Pass the Hash, PsExec, and More

The Cyber Mentor via YouTube Direct link

- Do you see yourself exploiting Windows more than Linux when pentesting?

13 of 31

13 of 31

- Do you see yourself exploiting Windows more than Linux when pentesting?

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

NTLM Relay, Token Impersonation, Pass the Hash, PsExec, and More

Automatically move to the next video in the Classroom when playback concludes

  1. 1 - Welcome
  2. 2 - Week overview and additional AD resources
  3. 3 - Additional lab buildout
  4. 4 - Loading Metasploit's psexec
  5. 5 - Sidetrack -- Using CrackMapExec
  6. 6 - Getting a shell with psexec
  7. 7 - Fun with Meterpreter pt 1
  8. 8 - Token Impersonation with Incognito
  9. 9 - Fun with Meterpreter pt 2
  10. 10 - Pass the hash techniques
  11. 11 - NTLM relay and lab setup
  12. 12 - How entry level does HTB get?
  13. 13 - Do you see yourself exploiting Windows more than Linux when pentesting?
  14. 14 - Did you use an Empire payload?
  15. 15 - Business adventures
  16. 16 - How was you first pentest on the job?
  17. 17 - Do you send dropboxes to customers?
  18. 18 - Discussing graphics cards
  19. 19 - Citrix pentesting
  20. 20 - Graphics cards part 2
  21. 21 - Discussing cats!
  22. 22 - Do you store cracked passwords for later use?
  23. 23 - How does HTB prepare for the OSCP
  24. 24 - Thoughts on eWPT?
  25. 25 - What's after Zero to Hero?
  26. 26 - What is your day job?
  27. 27 - What's next in the course?
  28. 28 - How do you plan on finding clients?
  29. 29 - Family guy or American Dad?
  30. 30 - Errors and Omissions insurance / business talk
  31. 31 - What do you think of spectreops training?

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.