ycliper

Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
Скачать

Attacking ADCS Full Course

Автор: Hicham El Aaouad

Загружено: 2024-10-10

Просмотров: 5161

Описание: Attacking Active directory certificate services full course
//////////////////////////////// Support Me /////////////////////////////////
patreon :   / hichamelaaouad  

///////////////////////// description /////////////////////////////
Whenever I have an Active Directory pentest, most of the time I see LDAPS and internal websites using HTTPS, but I never asked where those protocols or applications got their certificates , or maybe they’re signed from a public trusted certificate authority or a local certificate authority. Since we are dealing with Active Directory, it’s usually going to be ADCS (Active Directory Certificate Services). That's why I decided to spend the last three months learning how to attack and abuse ADCS, and at the same time, create this full course for you to learn as well.

In this course, we’re going to start by buidling our adcs lab, then explaining
of the key elements to understanding how it works , which is PKI (Public Key Infrastructure). Then, we’ll move into the installation of ADCS and how sysadmins use it to secure their local infrastructure. We’ll also cover ADCS components like what a PKInit is, what a template is, CSR.
Then we’ll dive into the most interesting part: abusing the misconfigurations left by sysadmins. To better understand this, we’ll create those misconfigurations in our lab, and then we’ll abuse them to escalate privileges or establish persistence.
All the modules are well-organized in this course. Feel free to jump to any part if you’re already familiar with it, or return to a section if you need a refresher.
I’d love for you to support this channel by subscribing, liking, and leaving a comment below regarding any mistakes or improvements we should implement in future videos.
Let’s get started.
-----------------------------keywords----------------------------------
DCSync attack, Active Directory security, Domain credentials, Cybersecurity, Hackers, Windows security, Microsoft Active Directory, Privilege escalation, Penetration testing, IT security, Insider threats, Network security, Red teaming, Social engineering, Credential harvesting, Cyber threats, Identity theft, Cybercrime, Data breach, Cyber defense, Malware, Ransomware, Phishing, Spoofing, Encryption, Authentication, Authorization, Two-factor authentication, Multi-factor authentication, Access control, Firewall, Intrusion detection, Intrusion prevention, Vulnerability scanning, Patch management, Security policies, Incident response, Disaster recovery, Business continuity, Compliance, Risk management, Threat intelligence, Endpoint security, Cloud security, Mobile device security, Application security, Web security, Email security, Virtual private network (VPN), Network segmentation, Data loss prevention, Security awareness training, Security assessment, Security audit, Cyber insurance, Digital forensics, Cyber law, Cyber ethics, Cyber hygiene, Cyber bullying, Cyber stalking, Cyber terrorism, Cyber warfare, Artificial intelligence (AI) security, Internet of Things (IoT) security, Blockchain security, Big data security, Machine learning security, Dark web, Cyber espionage, Cyber sabotage, Cyber vigilante, Cyber activism, Cyber sovereignty, Cyber diplomacy, Cyber resilience, Cyber culture, Cybersecurity careers, Cybersecurity certifications, Cybersecurity trends, Windows security, network security, ethical hacking, red team, blue team,privilege escalation, lateral movement, Active Directory attacks, AD security, AD exploitation, network penetration testing, network security testing, vulnerability assessment, security assessment, ethical hacking tutorial, cybersecurity tutorial, cybersecurity education, cybersecurity skills, cybersecurity certification, cybersecurity career, cybersecurity jobs, IT jobs, IT career, cybersecurity industry, cybersecurity trends, cybersecurity news, cybersecurity best practices, cybersecurity tools, cybersecurity software, cybersecurity framework, cybersecurity standards, cyber law, data privacy, compliance, regulatory compliance, industry compliance, security compliance, information security management, cybersecurity risk management, cybersecurity strategy, cybersecurity planning, cybersecurity framework, security architecture, cyber resilience, incident response, threat intelligence, security operations center, security analyst, penetration tester certification, ethical hacking certification, cybersecurity certification, security certification, IT certification, online cybersecurity training, online ethical hacking training, online security training, active directory training,kerberoasting,GetUsersSPN,GetUsersSPN.py,getusersspn.py,getusersspn
---------------------------------MENU---------------------------------
00:00 intro
01:23 - What is a PKI ?
14:22 - ADCS installation
16:48 - How to use ADCS
20:35 - What is a template
20:55 - What is an EKU
21:25 - Creating a template
23:32 - What is a PIKINIT
26:09 - ESC1
31:12 - ESC2
33:37 - ESC3
37:07 - ESC8

Не удается загрузить Youtube-плеер. Проверьте блокировку Youtube в вашей сети.
Повторяем попытку...
Attacking ADCS Full Course

Поделиться в:

Доступные форматы для скачивания:

Скачать видео

  • Информация по загрузке:

Скачать аудио

Похожие видео

[Attack]tive Directory: Compromising a Network in 20 Minutes Through Active Directory

[Attack]tive Directory: Compromising a Network in 20 Minutes Through Active Directory

Введение в кибербезопасность | Обучение кибербезопасности для начинающих | CyberSecurity | Simpli...

Введение в кибербезопасность | Обучение кибербезопасности для начинающих | CyberSecurity | Simpli...

attack active directory for beginners with hackthebox | kerberos hacking

attack active directory for beginners with hackthebox | kerberos hacking

Но что такое нейронная сеть? | Глава 1. Глубокое обучение

Но что такое нейронная сеть? | Глава 1. Глубокое обучение

LLM и GPT - как работают большие языковые модели? Визуальное введение в трансформеры

LLM и GPT - как работают большие языковые модели? Визуальное введение в трансформеры

Маска подсети — пояснения

Маска подсети — пояснения

OSINT для начинающих: узнайте всё о ком угодно!

OSINT для начинающих: узнайте всё о ком угодно!

TR19: Fun with LDAP and Kerberos: Attacking AD from non-Windows machines

TR19: Fun with LDAP and Kerberos: Attacking AD from non-Windows machines

How Hackers Move Through Networks (with Ligolo)

How Hackers Move Through Networks (with Ligolo)

Finding and Fixing AD CS Issues with Locksmith w/ Jake Hildreth

Finding and Fixing AD CS Issues with Locksmith w/ Jake Hildreth

Active Directory Certificate Services Install & Config in just 20mins

Active Directory Certificate Services Install & Config in just 20mins

Certified Pre-Owned: Abusing Active Directory Certificate Services

Certified Pre-Owned: Abusing Active Directory Certificate Services

bypassing windows defender | Malware development

bypassing windows defender | Malware development

Понимание Active Directory и групповой политики

Понимание Active Directory и групповой политики

SANS Webcast: Kerberos & Attacks 101

SANS Webcast: Kerberos & Attacks 101

Becoming a Keymaster: Active Directory Certificate Services (ADCS) Attacks

Becoming a Keymaster: Active Directory Certificate Services (ADCS) Attacks

Hacking Active Directory - Part 1 (Enumeration)

Hacking Active Directory - Part 1 (Enumeration)

ReCertifying Active Directory Certificate Services

ReCertifying Active Directory Certificate Services

DEF CON 26 - Sean Metcalf - Exploiting Active Directory Administrator Insecurities

DEF CON 26 - Sean Metcalf - Exploiting Active Directory Administrator Insecurities

AD CS ESC1 Privilege Escalation Tutorial | Attack Active Directory Certificate Services

AD CS ESC1 Privilege Escalation Tutorial | Attack Active Directory Certificate Services

© 2025 ycliper. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]