So I Became a Domain Controller
Offered By: Black Hat via YouTube
Course Description
Overview
Explore a conference talk from Black Hat that delves into the exploitation of Active Directory replication protocols. Learn how SAMBA's implementation of these protocols, while long-standing, was challenging to abuse, particularly on Windows operating systems. Discover the breakthrough achieved by the lsadump::DCSync feature in mimikatz, which enabled red teamers to extract crucial secrets for Kerberos token abuse and even impersonate domain controllers. Gain insights into how this technique provides read access to the AD database, potentially compromising network security. Presented by Benjamin Delpy and Vincent Le Toux, this 42-minute session offers valuable knowledge for cybersecurity professionals and enthusiasts interested in understanding and defending against advanced Active Directory attacks.
Syllabus
So I became a Domain Controller
Taught by
Black Hat
Related Courses
Lateral Movement with MimikatzPluralsight Credential Access with Mimikatz
Pluralsight Windows Server and Active Directory Penetration Testing
YouTube Windows Defense Evasion - Lateral Movement Techniques - Red Team Series
Linode via YouTube Windows Red Team Credential Access Techniques - Red Team Series
Linode via YouTube