Penetration Testing Active Directory

Penetration Testing Active Directory

English | MP4 | AVC 1280×720 | AAC 48KHz 2ch | 1h 18m | 208 MB

As a security professional, one of your most important jobs is to make sure that only authorized users have access to your system. Most often, this is achieved via credential-based access control, where credentials are stored in central directories like Microsoft Active Directory (AD). But are you really ready to handle an unexpected cyberattack?

In this course, instructor Malcolm Shore gives you an overview of Active Directory, including how to enumerate it and validate its security with penetration testing. Explore the core concepts of penetration testing and why it’s so important for enterprise security management. Learn how AD interacts with identity providers and how you interact with it at the command line using LDAP protocol as well as through Powerpoint. Malcolm teaches you some key tricks and gives you examples of how to get the most out of your audits by understanding and utilizing spray attacks, hash extractions, impacket libraries, and brute force attacks.

Table of Contents

Introduction
1 Understand and test the security of identity providers
2 What you should know
3 Disclaimer

Introduction to Identities
4 Understand Active Directory’s role in security
5 The LDAP protocol
6 Interact with LDAP at the command line
7 The LDAPAdmin tool
8 What is Active Directory
9 Interact with Active Directory at the command line
10 Access LDAP services with a GUI client
11 Add users and computers to a domain
12 Active Directory security audit

Testing Active Directory
13 Set up for testing
14 Extract the AD hashes
15 Password spraying Active Directory
16 Kerberos brute-forcing attacks
17 Use CrackMapExec to access and enumerate AD
18 Investigate the SYSVOL share
19 Take advantage of legacy data

Advanced Penetration Testing
20 Specific Active Directory attacks
21 Remote extraction of AD hashes
22 Carry out a Kerberos roasting
23 Run a no-preauthentication attack
24 Forge a golden ticket
25 Set the BloodHound loose

Conclusion
26 Next steps

Homepage