Top 5 Microsoft Windows AD Hacks (demos of real world Active Directory hacking)
David Bombal
A big shoutout to TCM Security for sponsoring this video. Register now to receive a 50% discount on your first month at the TCM Security Academy, potentially making your most significant step toward a career in ethical hacking. Go here: https://davidbombal.wiki/3vQsqWm
// TCM Security SOCIAL// LinkedIn : https://www.linkedin.com/company/tcm-security-inc/ Twitter : https://twitter.com/TCMSecurity YouTube (The Cyber Mentor): https://www.youtube.com/c/TheCyberMentor Discord: https://discord.com/invite/tcm Instagram: https://www.instagram.com/tcmsecurity/ Facebook: https://www.facebook.com/tcmsecure/ TikTok: https://www.tiktok.com/@tcmsecurity Academy Website: https://academy.tcm-sec.com/ TCM Certifications: https://certifications.tcm-sec.com/ Discord: https://discord.com/invite/tcm Website: https://tcm-sec.com/ Breach Point Website: https://breachpoint.com/
// Heath Adam’s SOCIAL // LinkedIn: https://www.linkedin.com/in/heathadams/
// Resources REFERENCE // How to build and active directory hacking lab online: https://youtu.be/xftEuVQ7kY0
// David's SOCIAL // Discord: https://discord.com/invite/usKSyzb X: https://www.twitter.com/davidbombal Instagram: https://www.instagram.com/davidbombal LinkedIn: https://www.linkedin.com/in/davidbombal Facebook: https://www.facebook.com/davidbombal.co TikTok: http://tiktok.com/@davidbombal YouTube: https://www.youtube.com/@davidbombal
// MY STUFF // https://www.amazon.com/shop/davidbombal
// SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
// MENU // 00:00 - Introduction 01:30 - Labs Options 03:03 - How Do The Labs Work? 04:32 - Where Should You Start? 07:25 - TCM Certifications 09:40 - LLMNR Poisining 13:02 - Lab Example #1 (LLMNR Poisoning) 20:15 - Best Defences 21:01 - LLMNR: Mitigation 23:17 - SMB Relay 27:07 - Lab Example #2 (SMB Relay) 39:43 - When To Run Pentest 41:01 - Is Shell Popping Necessary? 43:43 - Why You Should Have A Pentest 46:09 - SMB Relay Mitigation 48:18 - Lazy Security 49:27 - Favourite Password Manager 50:00 - Gaining Shell Access 51:37 - Is IPv6 Common? 56:08 - Should You Disable IPv6? 57:04 - Do Large Organizations Use IPv6 Properly? 57:33 - Lab Example #3 (IPv6) 01:02:04 - As Administrator 01:06:21 - Pentests Are Important 01:07:30 - IPv6 Mitigation 01:09:56 - Pass The Password / Pass The Hash 01:14:00 - The CME DB 01:14:32 - Lab Example #4 (The CME DB) 01:19:15 - Pass The Hash / Pass the Password Mitigation 01:20:12 - Real World VS CTFs 01:21:35 - Kerberoasting 01:24:11 - Lab Example #5 (Kerberoasting) 01:26:38 - Kerberoasting Mitigation 01:27:50 - Are Window's 'Default Settings' Safe? 01:28:53 - Reach Out to TCM Security 01:29:16 - Real Life Pentest Case Studies 01:35:18 - Lab VS Real World 01:37:15 - How To Access The Internal Network 01:39:30 - Where To Get Started 01:41:11 - Conclusion 01:41:46 - Outro
pentest pentester hack hacker hacking ethical hacking ethical hacker course ethical hacker windows ad hacking microsoft windows microsoft windows hack windows 11 hack windows 11 hacking
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
Disclaimer: This video is for educational purposes only.
#hacker #pentester #microsoft ... https://www.youtube.com/watch?v=BsS7VITiUXo
589361591 Bytes