So I Became a Domain Controller
Offered By: Black Hat via YouTube
Course Description
Overview
Explore a conference talk from Black Hat that delves into the exploitation of Active Directory replication protocols. Learn how SAMBA's implementation of these protocols, while long-standing, was challenging to abuse, particularly on Windows operating systems. Discover the breakthrough achieved by the lsadump::DCSync feature in mimikatz, which enabled red teamers to extract crucial secrets for Kerberos token abuse and even impersonate domain controllers. Gain insights into how this technique provides read access to the AD database, potentially compromising network security. Presented by Benjamin Delpy and Vincent Le Toux, this 42-minute session offers valuable knowledge for cybersecurity professionals and enthusiasts interested in understanding and defending against advanced Active Directory attacks.
Syllabus
So I became a Domain Controller
Taught by
Black Hat
Related Courses
Attack on Titan M, Reloaded - Vulnerability Research on a Modern Security ChipBlack Hat via YouTube Attacks From a New Front Door in 4G & 5G Mobile Networks
Black Hat via YouTube AAD Joined Machines - The New Lateral Movement
Black Hat via YouTube Better Privacy Through Offense - How to Build a Privacy Red Team
Black Hat via YouTube Whip the Whisperer - Simulating Side Channel Leakage
Black Hat via YouTube