YoVDO

Hacking Active Directory for Beginners

Offered By: Cyber Mentor via YouTube

Tags

Penetration Testing Courses Cybersecurity Courses Ethical Hacking Courses Active Directory Courses Virtual Machines Courses HashCat Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Dive into a comprehensive 5-hour video tutorial on hacking Active Directory for beginners. Learn essential skills from setting up a lab environment to executing advanced post-compromise attacks. Master techniques like LLMNR poisoning, SMB relay attacks, IPv6 DNS attacks, and Kerberoasting. Explore tools such as PowerView, Bloodhound, and Mimikatz for domain enumeration and credential dumping. Gain practical knowledge on pass-the-hash attacks, token impersonation, and golden ticket attacks. Understand defense strategies and mitigations for various attack vectors. Ideal for aspiring ethical hackers and cybersecurity professionals looking to enhance their Active Directory penetration testing skills.

Syllabus

- Introduction
- Installing VMWare / VirtualBox
- Installing Linux
- Configuring VirtualBox
- Installing PMK
- Active Directory Overview
- Physical Active Directory Components
- Logical Active Directory Components
- AD Lab Overview
- Cloud Lab Alternative
- Downloading the Necessary ISOs
- Setting up the Domain Controller
- Setting Up the User Machines
- Setting Up Users, Groups, and Policies
- Joining Our Machines to the Domain
- Initial AD Attacks Overview
- LLMNR Poisoning Overview
- Capturing NTLMv2 Hashes with Responder
- Password Cracking with Hashcat
- LLMNR Poisoning Defenses
- SMB Relay Attacks Overview
- Quick Lab Update
- Discovering Hosts with SMB Signing Disabled
- SMB Relay Attacks Part 1
- SMB Relay Attacks Part 2
- SMB Relay Attack Defenses
- Gaining Shell Access
- IPv6 Attacks Overview
- Installing mitm6
- Setting up LDAPS
- IPv6 DNS Attacks
- IPv6 Attack Defenses
- Passback Attacks
- Other Attack Vectors and Strategies
- Post Compromise Enumeration Intro
- PowerView Overview
- Domain Enumeration with PowerView
- Bloodhound Overview
- Grabbing Data with Invoke Bloodhound
- Using Bloodhound to Review Domain Data
- Post-Compromise Attacks Intro
- Pass the Hash and Password Overview
- Installing crackmapexec
- Pass the Password Attacks
- Dumping Hashes with secretsdump
- Cracking NTLM Hashes with Hashcat
- Pass the Hash Attacks
- Pass Attack Mitigations
- Token Impersonation Overview
- Token Impersonation with Incognito
- Token Impersonation Mitigation
- Kerberoasting Overview
- Kerberoasting Walkthrough
- Kerberoasting Defenses
- GPP Password Attacks Overview
- Abusing GPP Part 1
- Abusing GPP Part 2
- URL File Attacks
- Mimikatz Overview
- Credential Dumping with Mimikatz
- Golden Ticket Attacks
- Conclusion


Taught by

The Cyber Mentor

Related Courses

Certified Ethical Hacker (CEH) - Linux Academy's Prep Course
A Cloud Guru
Advanced Python Scripting for Cybersecurity
Infosec via Coursera
Introduction to IT Security
Akamai via Coursera
Cyber Comp 1A
Cabrillo College via California Community Colleges System
Ethical Hacking
Cabrillo College via California Community Colleges System