Active HTB | OSCP+ Active Directory Practice
Автор: h4ck0rman
Загружено: 2025-06-16
Просмотров: 95
Описание:
In this video, I tear through an HTB Active Directory box as part of my OSCP+ prep. No fluff — just pure offensive workflow.
We kick off with an Nmap scan to scope out the attack surface. From there, it’s straight into SMB null sessions, cracking open shares, and pulling a GPP password like it’s 2018. Kerberoasting gives us some tasty hashes, and we wrap it all up with a clean psexec to full domain access.
If you’re serious about learning real-world AD attacks for OSCP or internal red team ops, this one’s for you. I don’t waste time — every step is actionable, replicable, and something you need in your arsenal.
Not a beginner tutorial... or is it? This is definitely well within the scope of OSCP+ in my opinion.
0:00 Introduction
0:18 Nmap Scans
1:10 SMB Null Session
2:30 GPPPasswords
4:00 Roasting Exploits
5:25 PSexec
oscp prep active directory hacking, hack the box oscp walkthrough, smb enumeration tutorial, gpp password exploitation, smb null session attack, kerberoasting explained, windows privilege escalation oscp, ad pentest lab walkthrough, psexec exploitation guide, oscp like machines walkthrough, internal network penetration testing, hack the box oscp plus, real world active directory attacks, red team ad tactics, oscp smb enumeration, hackthebox oscp prep, active directory privilege escalation, kerberoasting attack tutorial, sysvol gpp password, smb share enumeration oscp
Повторяем попытку...

Доступные форматы для скачивания:
Скачать видео
-
Информация по загрузке: