Companies Home Search Profile

Attacking And Defending Active Directory: AD Pentesting

Focused View

Vivek Pandit

8:21:01

6 View
  • 1. Introduction.mp4
    06:04
  • 1.1 1. Active Directory Basics.pdf
  • 1. Active Directory Basics.mp4
    30:56
  • 2. Task.mp4
    00:28
  • 3. Quiz.html
  • 1.1 2. Active Directory Authentication.pdf
  • 1. Active directory authentication overview.mp4
    07:32
  • 2. Hashing algorithms in windows.mp4
    08:26
  • 3. Kerberos basics.mp4
    04:11
  • 4. Components of kerberos.mp4
    08:03
  • 5. kerberos explanation with diagram.mp4
    12:40
  • 6. Difference between NTLM and kerberos authentication.mp4
    03:51
  • 7. Group policy in active directory.mp4
    08:31
  • 8. Task.mp4
    00:31
  • 9. Quiz.html
  • 1.1 3. Active Directory Lab Setup.pdf
  • 1. Overview of lab setup.mp4
    04:38
  • 2. Necessary files for lab setup.mp4
    01:24
  • 3. Domain controller installation and setup.mp4
    10:58
  • 4. Windows client installation.mp4
    05:50
  • 5. Domain Controller configuration.mp4
    07:19
  • 6. Joining computers with domain controller.mp4
    05:18
  • 7. Clinet machines configuration.mp4
    03:39
  • 8. Client machines configurations -2.mp4
    04:16
  • 1.1 5. Powershell Basics and File Transfer Basics.pdf
  • 1. Powershell overview.mp4
    02:06
  • 2. Powerhsell commands practical.mp4
    07:28
  • 3. File transfer methods overview.mp4
    01:41
  • 4. File transfer practical.mp4
    08:17
  • 5. Quiz.html
  • 1.1 4. Breaching In Active Directory.pdf
  • 1. Breaching overview.mp4
    02:24
  • 2. OSINT and phishing.mp4
    05:55
  • 3. Initial access using web attacks.mp4
    01:26
  • 4. LLMNR poisoning overview and mitigations.mp4
    07:19
  • 5. LLMNR poisoning practical attack using SMB.mp4
    11:27
  • 6. LLMNR poisoning practical attack using WPAD.mp4
    02:09
  • 7. SMB relay attack overview and mitigations.mp4
    06:28
  • 8. SMB relay attack practical.mp4
    05:46
  • 9. AS-REP Roasting overview.mp4
    01:34
  • 10. AS-REP Roasting practical attack.mp4
    03:51
  • 11. PasswordSpray attack overview.mp4
    02:48
  • 12. PasswordSpray attack practical.mp4
    05:13
  • 13. More methods of initial access on AD.mp4
    04:18
  • 14. Breaching mitigations.mp4
    04:52
  • 15. Quiz.html
  • 1.1 6. Enumeration In Active Directory.pdf
  • 1. Enumeration in active directory overview.mp4
    00:24
  • 2. Enumeration using powershell native commands.mp4
    07:42
  • 3. PowerView overview.mp4
    01:18
  • 4. PowerView - 1.mp4
    06:32
  • 5. Lab Update.mp4
    02:38
  • 6. PowerView - 2.mp4
    07:33
  • 7. PowerView - 3.mp4
    05:03
  • 8. BloodHound overview.mp4
    03:42
  • 9. BloodHound Practical.mp4
    14:29
  • 10. AD lab troubleshooting.mp4
    03:15
  • 11. Task.mp4
    01:03
  • 12. Quiz.html
  • 1.1 7. Lateral Movement In Active Directory.pdf
  • 1. Lateral movement overview.mp4
    01:45
  • 2. Pass-the-hash attack overview and mitigations.mp4
    03:06
  • 3. Pass-the-hash attack practical.mp4
    03:21
  • 4. Pass-the-ticket overview.mp4
    04:35
  • 5. Pass-the-ticket attack practical.mp4
    08:19
  • 6. Overpass-the-hash overview.mp4
    03:37
  • 7. Overpass-the-hash attack practical.mp4
    05:09
  • 8. RDP Hijacking overview.mp4
    01:17
  • 9. RDP Hijacking attack practical.mp4
    04:39
  • 10. Task.mp4
    00:35
  • 11. Quiz.html
  • 1.1 8. Pivoting In Active Directory.pdf
  • 1. Pivoting intro.mp4
    04:58
  • 2. Lab setup overview.mp4
    02:59
  • 3. Chisel intro.mp4
    03:59
  • 4. Pivoting practical.mp4
    14:52
  • 5. Quiz.html
  • 1.1 9. Exploitation In Active Directory.pdf
  • 1. Exploitation overview.mp4
    02:22
  • 2. Kerberosting overview.mp4
    00:55
  • 3. kerberosting Practical.mp4
    05:40
  • 4. Exploiting permission delegation overview #1.mp4
    04:39
  • 5. Exploiting permission delegation practical #1.mp4
    15:57
  • 6. Exploiting permission delegation overview #2.mp4
    02:05
  • 7. Exploiting permission delegation practical #2.mp4
    06:30
  • 8. Group memebership abuse overview #1.mp4
    01:45
  • 9. Group memebership abuse practical #1.mp4
    10:35
  • 10. Group memebership abuse overview #2.mp4
    14:45
  • 11. Group memebership abuse practical #2.mp4
    03:41
  • 12. More on group membership abuse.mp4
    03:37
  • 13. GPO abuse overview.mp4
    02:21
  • 14. GPO abuse practical.mp4
    10:50
  • 15. Extracting logged on admins hashes.mp4
    06:06
  • 16. Printnightmare attack overview.mp4
    01:58
  • 17. Printnightmare attack practical.mp4
    11:36
  • 18. Zerologgon attack overview.mp4
    02:12
  • 19. Zerologgon attack practical.mp4
    05:57
  • 20. Keberos delegation overview.mp4
    06:59
  • 21. Task.mp4
    01:55
  • 22. Quiz.html
  • 1.1 10. Persistence In Active Directory.pdf
  • 1. Persistance overview.mp4
    02:18
  • 2. Golden and silver ticket attack overview and mitigations.mp4
    05:43
  • 3. Golden and silver ticket attack practical.mp4
    05:39
  • 4. Diamond ticket attack overview.mp4
    03:12
  • 5. Diamond ticket attack practical.mp4
    06:25
  • 6. DCSync overview.mp4
    01:15
  • 7. DCSync attack practical.mp4
    03:03
  • 8. DSRM abuse overview.mp4
    03:09
  • 9. DSRM Abuse practical.mp4
    04:04
  • 10. GPO for persistance.mp4
    04:54
  • 11. Task.mp4
    01:13
  • 12. Quiz.html
  • 1.1 Active Directory Cheatsheet.html
  • 1.2 Attacking AD.html
  • 1.3 WADComs.html
  • 1. Bonus lecture.mp4
    01:14
  • Description


    Explore Active Directory Pentesting: Attack, Defend, and Secure. Master Active Directory Pentesting

    What You'll Learn?


    • Concepts Of Active Directory Pentesting
    • Powershell Basics
    • File Transfer Basics
    • Post-Exploitation Activities
    • Mitigation and Defense
    • Hands-On Labs
    • Breaching In Active Directory
    • Enumeration In Active Directory
    • Lateral Movement In Active Directory
    • Pivoting
    • Exploitation In Active Directory
    • Persistance In Active Directory

    Who is this for?


  • Ethical hackers
  • Red Teamers
  • Penetration Testers
  • What You Need to Know?


  • You will learn everything about Active Directory Pentesting no previous knowlege is required.
  • A Computer or a laptop is required
  • More details


    Description

    Embark on a cybersecurity journey with our course, "Attacking and Defending Active Directory." This comprehensive program is tailored for both cybersecurity enthusiasts and professionals seeking to master the complexities of Active Directory security and Active Directory Pentesting.

    The course kicks off with fundamental topics such as Active Directory basics, authentication processes, and essential PowerShell and file transfer skills.


    • Gain an in-depth understanding of Active Directory structure and components.

    • Explore the intricacies of domains, forests, trust relationships, and organizational units.

    • Learn to identify and assess vulnerabilities within Active Directory configurations.

    • Analyze Group Policy settings and other security parameters for weaknesses.

    • Explore common misconfigurations and security weaknesses in Active Directory.

    • Develop proficiency in exploiting vulnerabilities to gain unauthorized access.

    • Develop strategies for securing and hardening Active Directory environments.

    • Understand best practices for defending against common attack techniques.


    In the initial stages, participants will build a solid foundation in understanding the structure of Active Directory, exploring its components, organizational units, and trust relationships. The focus then shifts to authentication mechanisms, ensuring a secure environment for user identities and access controls. The course further hones skills in PowerShell and file transfer techniques, providing essential tools for effective penetration testing in a Windows environment for Active Directory Pentesting.

    As the journey progresses, participants will delve into the heart of offensive security, learning to breach, enumerate, and exploit vulnerabilities within Active Directory environments. Engaging lectures, hands-on labs, and real-world simulations offer a dynamic learning experience. The course culminates in a comprehensive understanding of lateral movement, pivoting, persistence strategies, and advanced exploitation techniques. Throughout the program, ethical hacking principles and responsible disclosure practices are emphasized, ensuring participants are well-equipped to navigate, assess, and fortify Active Directory environments confidently.


    Join us in mastering the art of attacking and defending Active Directory—enroll now to elevate your cybersecurity expertise in Active Directory Pentesting!

    Course Curriculum:

    1. Introduction

      1. Introduction

    2. Active Directory Basics

      1. Active Directory Basics

      2. Task

      3. Quiz

    3. Active Directory Authentication

      1. Active Directory Authentication Overview

      2. Hashing algorithms in windows

      3. Kerberos basics

      4. Components of kerberos

      5. kerberos explanation with diagram

      6. kerberos explanation with diagram

      7. Group policy in active directory

      8. Task

      9. Quiz

    4. Active Directory Pentesting Lab setup

      1. Overview of lab setup

      2. Necessary files for lab setup

      3. Domain controller installation and setup

      4. Windows client installation

      5. Domain Controller configuration

      6. Joining computers with domain controller

      7. Client machines configuration

      8. Client machines configurations -2

    5. Powershell Basics and file transfer basics

      1. Powershell overview

      2. Powerhsell commands practical

      3. File transfer methods overview

      4. File transfer practical

      5. Quiz

    6. Breaching In Active Directory Pentesting

      1. Breaching overview

      2. OSINT and phishing

      3. Initial access using web attacks

      4. LLMNR poisoning overview and mitigations

      5. LLMNR poisoning practical attack using SMB

      6. LLMNR poisoning practical attack using WPAD

      7. SMB relay attack overview and mitigations

      8. SMB relay attack practical

      9. AS-REP Roasting overview

      10. AS-REP Roasting practical attack

      11. PasswordSpray attack overview

      12. PasswordSpray attack practical

      13. More methods of initial access on AD

      14. Breaching mitigations

      15. Quiz

    7. Enumeration In Active Directory Pentesting

      1. Enumeration in active directory overview

      2. Enumeration using powershell native commands

      3. PowerView overview

      4. PowerView - 1

      5. Lab Update

      6. PowerView - 2

      7. PowerView - 3

      8. BloodHound overview

      9. BloodHound Practical

      10. AD lab troubleshooting

      11. Task

      12. Quiz

    8. Lateral Movement in Active Directory Pentesting

      1. Lateral movement overview

      2. Pass-the-hash attack overview and mitigations

      3. Pass-the-hash attack practical

      4. Pass-the-ticket overview

      5. Pass-the-ticket attack practical

      6. Overpass-the-hash overview

      7. Overpass-the-hash attack practical

      8. RDP Hijacking overview

      9. RDP Hijacking attack practical

      10. Task

      11. Quiz

    9. Pivoting In Active Directory Pentesting

      1. Pivoting intro

      2. Lab setup overview

      3. Chisel intro

      4. Pivoting practical

      5. Quiz

    10. Exploitation In Active Directory Pentesting

      1. Exploitation overview

      2. Kerberosting overview

      3. kerberosting Practical

      4. Exploiting permission delegation overview #1

      5. Exploiting permission delegation practical #1

      6. Exploiting permission delegation overview #2

      7. Exploiting permission delegation practical #2

      8. Group memebership abuse overview #1

      9. Group memebership abuse practical #1

      10. Group memebership abuse overview #2

      11. Group memebership abuse practical #2

      12. More on group membership abuse

      13. GPO abuse overview

      14. GPO abuse practical

      15. Extracting logged on admins hashes

      16. Printnightmare attack overview

      17. Printnightmare attack practical

      18. Zerologgon attack overview

      19. Zerologgon attack practical

      20. Keberos delegation overview

      21. Task

      22. Quiz

    11. Persistence In Active Directory Pentesting

      1. Persistance overview

      2. Golden and silver ticket attack overview and mitigations

      3. Golden and silver ticket attack practical

      4. Diamond ticket attack overview

      5. Diamond ticket attack practical

      6. DCSync overview

      7. DCSync attack practical

      8. DSRM abuse overview

      9. DSRM Abuse practical

      10. GPO for persistance

      11. Task

      12. Quiz

    12. Bonus Lecture

      1. Bonus lecture

    Thank You,

    Vivek Pandit


    Who this course is for:

    • Ethical hackers
    • Red Teamers
    • Penetration Testers

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Vivek Pandit
    Vivek Pandit
    Instructor's Courses
    That's great to hear that Vivek Pandit is a successful ethical hacker who is providing his services to both government and private sectors in India. It's also impressive that he holds certifications like OSCP, CEH, and CISSP which are highly respected in the information security industry.Furthermore, training more than 25000 students worldwide is a significant achievement and demonstrates his dedication to sharing his knowledge and expertise with others. It's important to have skilled professionals in the field of ethical hacking to help protect organizations from cyber threats and vulnerabilities.Overall, it's encouraging to see individuals like Vivek Pandit making a positive impact in the cybersecurity industry, and I wish him continued success in his career.
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 95
    • duration 8:21:01
    • Release Date 2024/02/09