Advanced Pen Testing Techniques for Active Directory

seeders: 26
leechers: 5
updated:
Added by tutsnode in Other > Tutorials

Download Fast Safe Anonymous
movies, software, shows...
  • Downloads: 59
  • Language: English

Files

Advanced Pen Testing Techniques for Active Directory [TutsNode.net] - Advanced Pen Testing Techniques for Active Directory 04 - 3. Advanced Penetration Testing
  • 07 - Using rubeus to take over the domain.mp4 (19.0 MB)
  • 09 - Using smartcards to gain privileged access.srt (7.8 KB)
  • 10 - Set the BloodHound loose.srt (7.2 KB)
  • 06 - Running a shadow attack.srt (6.8 KB)
  • 07 - Using rubeus to take over the domain.srt (6.5 KB)
  • 05 - Forge a golden ticket.srt (5.9 KB)
  • 04 - Run a no-preauthentication attack.srt (3.9 KB)
  • 08 - Relaying attacks to get a certificate.srt (3.4 KB)
  • 02 - Remote extraction of AD hashes.srt (2.9 KB)
  • 03 - Carry out a Kerberos roasting.srt (2.2 KB)
  • 01 - Specific Active Directory attacks.srt (1.6 KB)
  • 10 - Set the BloodHound loose.mp4 (17.3 MB)
  • 05 - Forge a golden ticket.mp4 (16.7 MB)
  • 09 - Using smartcards to gain privileged access.mp4 (13.4 MB)
  • 04 - Run a no-preauthentication attack.mp4 (13.0 MB)
  • 06 - Running a shadow attack.mp4 (12.0 MB)
  • 08 - Relaying attacks to get a certificate.mp4 (8.8 MB)
  • 02 - Remote extraction of AD hashes.mp4 (5.3 MB)
  • 03 - Carry out a Kerberos roasting.mp4 (4.5 MB)
  • 01 - Specific Active Directory attacks.mp4 (2.3 MB)
02 - 1. Introduction to Identities
  • 05 - What is Active Directory.srt (9.8 KB)
  • 01 - Understand Active Directory's role in security.srt (8.1 KB)
  • 03 - Interact with LDAP at the command line.srt (4.6 KB)
  • 07 - Access LDAP services with a GUI client.mp4 (17.8 MB)
  • 07 - Access LDAP services with a GUI client.srt (7.1 KB)
  • 04 - The LDAPAdmin tool.srt (1.9 KB)
  • 08 - Add users and computers to a domain.srt (4.4 KB)
  • 06 - Interact with Active Directory at the command line.srt (2.4 KB)
  • 09 - Active Directory security audit.srt (2.6 KB)
  • 02 - The LDAP protocol.srt (3.0 KB)
  • 05 - What is Active Directory.mp4 (13.6 MB)
  • 01 - Understand Active Directory's role in security.mp4 (12.2 MB)
  • 08 - Add users and computers to a domain.mp4 (11.5 MB)
  • 03 - Interact with LDAP at the command line.mp4 (8.0 MB)
  • 02 - The LDAP protocol.mp4 (3.9 MB)
  • 09 - Active Directory security audit.mp4 (3.6 MB)
  • 06 - Interact with Active Directory at the command line.mp4 (3.6 MB)
  • 04 - The LDAPAdmin tool.mp4 (3.3 MB)
01 - Introduction
  • 01 - Understand and test the security of identity providers.srt (1.3 KB)
  • 02 - What you should know.srt (0.9 KB)
  • 03 - Disclaimer.srt (2.3 KB)
  • 01 - Understand and test the security of identity providers.mp4 (3.4 MB)
  • 03 - Disclaimer.mp4 (2.8 MB)
  • 02 - What you should know.mp4 (1.2 MB)
03 - 2. Testing Active Directory
  • 01 - Set up for testing.srt (6.2 KB)
  • 04 - Kerberos brute-forcing attacks.srt (3.8 KB)
  • 06 - Investigate the SYSVOL share.srt (3.5 KB)
  • 05 - Use CrackMapExec to access and enumerate AD.srt (3.1 KB)
  • 02 - Extract the AD hashes.srt (3.0 KB)
  • 03 - Password spraying Active Directory.srt (2.8 KB)
  • 07 - Take advantage of legacy data.srt (1.6 KB)
  • 01 - Set up for testing.mp4 (13.9 MB)
  • 02 - Extract the AD hashes.mp4 (8.1 MB)
  • 05 - Use CrackMapExec to access and enumerate AD.mp4 (7.3 MB)
  • 03 - Password spraying Active Directory.mp4 (7.1 MB)
  • 06 - Investigate the SYSVOL share.mp4 (6.4 MB)
  • 04 - Kerberos brute-forcing attacks.mp4 (6.1 MB)
  • 07 - Take advantage of legacy data.mp4 (5.1 MB)
05 - Conclusion
  • 01 - Next steps.srt (1.7 KB)
  • 01 - Next steps.mp4 (2.2 MB)
  • TutsNode.net.txt (0.1 KB)
  • .pad
    • 0 (0.5 KB)
    • 1 (66.4 KB)
    • 2 (189.8 KB)
    • 3 (12.2 KB)
    • 4 (121.5 KB)
    • 5 (148.0 KB)
    • 6 (119.7 KB)
    • 7 (24.7 KB)
    • 8 (71.0 KB)
    • 9 (207.9 KB)
    • 10 (1.7 KB)
    • 11 (192.5 KB)
    • 12 (202.8 KB)
    • 13 (19.8 KB)
    • 14 (218.2 KB)
    • 15 (161.2 KB)
    • 16 (101.5 KB)
    • 17 (174.0 KB)
    • 18 (200.2 KB)
    • 19 (117.0 KB)
    • 20 (34.2 KB)
    • 21 (67.7 KB)
    • 22 (135.8 KB)
    • 23 (157.5 KB)
    • 24 (77.3 KB)
    • 25 (215.0 KB)
    • 26 (249.3 KB)
    • 27 (187.8 KB)
    • 28 (20.2 KB)
  • [TGx]Downloaded from torrentgalaxy.to .txt (0.6 KB)

Description


Description

As a security professional, one of your most important jobs is to make sure that only authorized users have access to your system. Most often, this is achieved via credential-based access control, where credentials are stored in central directories like Microsoft Active Directory (AD). But are you really ready to handle an unexpected cyberattack?

In this course, instructor Malcolm Shore gives you an overview of Active Directory, including how to enumerate it and validate its security with penetration testing. Explore the core concepts of penetration testing and why it’s so important for enterprise security management. Learn how AD interacts with identity providers and how you interact with it at the command line using LDAP protocol as well as through Powerpoint. Malcolm teaches you some key tricks and gives you examples of how to get the most out of your audits by understanding and utilizing spray attacks, hash extractions, impacket libraries, and brute force attacks.

Last Updated 1/2021



Download torrent
257 MB
seeders:26
leechers:5
Advanced Pen Testing Techniques for Active Directory


Trackers

tracker name
udp://open.stealth.si:80/announce
udp://tracker.tiny-vps.com:6969/announce
udp://fasttracker.foreverpirates.co:6969/announce
udp://tracker.opentrackr.org:1337/announce
udp://explodie.org:6969/announce
udp://tracker.cyberia.is:6969/announce
udp://ipv4.tracker.harry.lu:80/announce
udp://tracker.uw0.xyz:6969/announce
udp://opentracker.i2p.rocks:6969/announce
udp://tracker.birkenwald.de:6969/announce
udp://tracker.torrent.eu.org:451/announce
udp://tracker.moeking.me:6969/announce
udp://tracker.dler.org:6969/announce
udp://9.rarbg.me:2970/announce
µTorrent compatible trackers list

Download torrent
257 MB
seeders:26
leechers:5
Advanced Pen Testing Techniques for Active Directory


Torrent hash: 8F2A4843A72C75F7689C995F0BEE00E9ABE1932E