Download PentesterAcademy | Attacking and Defending Active Directory [FCO] GloDLS torrent - GloDLS
Login
Username:
Password:
Remember Me:
[Signup]
[Recover Account]
Friends
Angie Torrents
Friendly Site

Get Into Way
Friendly site

Free Courses Online
Friendly site

KaranPC
Friendly site

OneHack
Friendly site

IGGGames
Friendly site

Torrent Details For "PentesterAcademy | Attacking and Defending Active Directory [FCO] GloDLS"

PentesterAcademy | Attacking and Defending Active Directory [FCO] GloDLS

To download this torrent, you need a BitTorrent client: Vuze or BTGuard
Download this torrent
Download using Magnet Link

Health:
Seeds: 22
Leechers: 0
Completed: 102 
Last Checked: 26-11-2021 01:39:28

Uploader Reputation points : 16612





Write a Review for the Uploader:   235   Say Thanks with one good review:
Share on Facebook


Details
Name:PentesterAcademy | Attacking and Defending Active Directory [FCO] GloDLS
Description:


Author: Nikhil Mittal
Language: English
Lectures: 25
Torrent Contains: 31 Files, 1 Folders
Course Source: https://www.pentesteracademy.com/course?id=47

Description:

The importance of Active Directory in an enterprise cannot be stressed enough. Used by more than 90% of Fortune 1000 companies, the all-pervasive AD is the focal point for adversaries. Still, when it comes to AD security, there is a large gap of knowledge, which security professionals and administrators struggle to fill. Over the years, we have taught numerous professionals in real world trainings on AD security and always found that there is a lack of quality material, which can take students from basics of Active Directory security, and teach them how to attack and defend it.

Attacking and Defending Active Directory is beginner friendly course designed for security professionals who would like to enhance their AD security knowledge and want to understand practical threats and attacks in a modern Active Directory environment. The course is based on our years of experience of making and breaking Windows and AD environments and teaching security professionals.

We cover topics like AD enumeration, trusts mapping, domain privilege escalation, domain persistence, Kerberos based attacks (Golden ticket, Silver ticket and more), ACL issues, SQL server trusts, Defenses and bypasses of defenses.

You can either create your own Active Directory lab and follow along, or subscribe to one of our premium labs.

A non-exhasutive list of topics to be covered include:

• Active Directory Enumeration. Use scripts, built-in tools and MS ActiveDirectory module to enumerate the target domain.
ø Understand how useful information like users, groups, group memberships, computers, user properties etc. from the domain controller is available to even a normal user.
ø Understand and enumerate intra-forest and inter-forest trusts. Practice how to extract information from the trusts.
ø Enumerate Group policies.
ø Enumerate ACLs and learn to find out 'interesting rights on ACLs in the target domain to carry out attacks.

• Local Privilege Escalation
ø Learn different local privilege escalation techniques on a Windows machine.
ø Hunt for local admin privileges on machines in the target domain using multiple methods.
ø Abuse enterprise applications to execute complex attack paths that involve bypassing antivirus and pivoting to different machines.

• Domain Privilege Escalation
ø Learn to find credentials and sessions of high privileges domain accounts like Domain Administrators, extracting their credentials and then using credential replay attacks to escalate privileges, all of this with just using built-in protocols for pivoting.
ø Learn to extract credentials from a restricted environment where application whitelisting is enforced. Abuse derivative local admin privileges and pivot to other machines to escalate privileges to domain level.
ø Understand the classic Kerberoast and its variants to escalate privileges.
ø Enumerate the domain for objects with unconstrained delegation and abuse it to escalate privileges.
ø Find domain objects with constrained delegation enabled. Understand and execute the attacks against such objects to escalate privileges to a single service on a machine and to the domain administrator using alternate tickets.
ø Learn how to abuse privileges of Protected Groups to escalate privileges.

• Domain Persistence and Dominance
ø Abuse Kerberos functionality to persist with DA privileges. Forge tickets to execute attacks like Golden ticket and Silver ticket to persist.
ø Subvert the authentication on the domain level with Skeleton key and custom SSP.
ø Abuse the DC safe mode Administrator for persistence.
ø Abuse the protection mechanism like AdminSDHolder for persistence.
ø Abuse minimal rights required for attacks like DCSync by modifying ACLs of domain objects.
ø Learn to modify the host security descriptors of the domain controller to persist and execute commands without needing DA privileges.

• Cross trust attacks
ø Learn to elevate privileges from Domain Admin of a child domain to Enterprise Admin on the forest root by abusing Trust keys and krbtgt account.
ø Execute intra-forest trust attacks to access resources across forest.
ø Abuse database links to achieve code execution across forest by just using the databases.

• Forest persistence and dominance
ø Understand forest persistence technique like DCShadow. Execute it to modify objects in the forest root without leaving change logs. Learn minimal permissions required to use DCShadow and avoid change logs for minimal permissions using Shadowception.

• Defenses – Monitoring
ø Learn about useful events logged when the discussed attacks are executed.

• Defenses and bypass – Architecture and Work culture Changes
ø Learn briefly about architecture and work culture changes required in an organization to avoid the discussed attacks. We discuss Temporal group membership, ACL Auditing, LAPS, SID Filtering, Selective Authentication, credential guard, device guard, Protected Users Group, PAW, Tiered Administration and ESAE or Red Forest.
ø Learn how Microsoft's Advanced Threat Analytics and other similar tools detect domain attacks and the ways to avoid and bypass such tools.

• Defenses and bypass – Deception
ø Understand how Deception can be effective deployed as a defense mechanism in AD. Deploy decoy user objects, which have interesting properties set, which have ACL rights over other users and have high privilege access in the domain along with available protections. Deploy computer objects and Group objects to deceive an adversary. Learn how adversaries can identify decoy objects and how defenders can avoid the detection.

• Defenses and bypass – PowerShell
ø Learn about various improvements in Windows PowerShell v5 and their significance in detecting attacks. We will discuess System Wide Transcription, Enhance logging, Constrained Language Mode, AMSI etc. Learn how JEA helps in secure administration. Execute bypasses against the discussed defenses and the detection of bypasses.

About Author:

Nikhil Mittal is a hacker, infosec researcher, speaker and enthusiast. His area of interest includes penetration testing, attack research, defence strategies and post exploitation research. He has 6+ years of experience in Penetration Testing for his clients which include many global corporate giants. He is also a member of Red teams of selected clients.

He specializes in assessing security risks at secure environments which require novel attack vectors and “out of the box” approach. He has worked extensively on using Human Interface Device in Penetration Tests and PowerShell for post exploitation. He is creator of Kautilya, a toolkit which makes it easy to use HIDs in penetration tests and Nishang, a post exploitation framework in PowerShell. In his spare time, Nikhil researches on new attack methodologies and updates his tools and frameworks.

Nikhil has held trainings and boot camps for various corporate clients (in US, Europe and SE Asia), and at the world’s top information security conferences.He has spoken at conferences like Defcon, BlackHat USA, BlackHat Europe, RSA China, Troopers, DeepSec, PHDays, BlackHat Abu Dhabi, Hackfest, ClubHack, EuSecWest and more. He blogs at Lab of Penetration Tester.




YouTube Video:
Category:Tutorials
Language:English  English
Total Size:4.06 GB
Info Hash:2F462C178D3114FCAC34AF8F00F07EC3AEC8F27D
Added By:Prom3th3uS Super AdministratorMovie PirateVIP
Date Added:2019-06-02 16:06:54
Torrent Status:Torrent Verified


Ratings:Not Yet Rated (Log in to rate it)


Tracker:
udp://tracker.iamhansen.xyz:2000/announce

This Torrent also has backup trackers
URLSeedersLeechersCompleted
udp://tracker.iamhansen.xyz:2000/announce000
udp://tracker.torrent.eu.org:451/announce4018
udp://tracker.cyberia.is:6969/announce000
udp://tracker.leechers-paradise.org:6969/announce000
udp://tracker.uw0.xyz:6969/announce000
udp://exodus.desync.com:6969/announce2029
udp://explodie.org:6969/announce300
udp://denis.stalker.upeer.me:6969/announce000
udp://tracker.opentrackr.org:1337/announce5031
udp://9.rarbg.to:2710/announce000
udp://tracker.tiny-vps.com:6969/announce1010
udp://ipv4.tracker.harry.lu:80/announce400
udp://tracker.coppersurfer.tk:6969/announce000
udp://tracker.internetwarriors.net:1337/announce3014
udp://open.demonii.si:1337/announce000


File List: 





Comments
No comments still posted