Windows Red Team Credential Access Techniques - Red Team Series
Offered By: Linode via YouTube
Course Description
Overview
Syllabus
Introduction
What We’ll Be Covering
What is Credential Access?
Mitre Attack Techniques - Credential Access
Let’s Get Started
What is mimikatz?
Using mimikatz with our High Integrity Agent
Are There Any Login Passwords in Memory?
Using lsadump
Using the meterprater
Preparing the mimikatz Binaries
Dumping the Login Passwords
Using hash dump
Loading mimikatz with load_kiwi
Using the lsa_dump_sam and lsa_dump_secrets Command
Results from the Powershell Agent
Using the mimikatz-cache Module
Locating Our unattended.xml File
Uploading the Binary to the Target
Listing Login Sessions
Our Second Windows Target
Running mimikatz Modules using Starkiller
Listing Tokens We Can Impersonate
Uploading mimikatz
Using logonpasswords
Using lsadump::sam
Using sekursla::logonpasswords
Using the Windows Credentials Editor
Using hashdump
Using johntheripper
Conclusion
Taught by
Linode
Related Courses
Defense Evasion with MeterpreterPluralsight Post Exploitation with Meterpreter
Pluralsight Post Exploitation Hacking
Cybrary Pentesting for N00bs - Blue
Cyber Mentor via YouTube NTLM Relay, Token Impersonation, Pass the Hash, PsExec, and More
Cyber Mentor via YouTube