Companies Home Search Profile

Stealthy Domain Enumeration

Focused View

Naga Sai Nikhil

1:26:13

10 View
  • 1. Welcome to the course.html
  • 1. Creating a powershell script loader using System.Management.Automation.dll.mp4
    25:00
  • 1. Enumerating kerberoastable users using C#.mp4
    08:15
  • 1. Enumerating ASREPRoastable users.mp4
    12:51
  • 1. Enumerating Unconstrained delegated computers.mp4
    05:32
  • 1. Enumerating users those have constrained delegation.mp4
    02:32
  • 1. Enumerating Resource Based Constrained Delegation.mp4
    17:19
  • 1. Enumerating DCSync capable users.mp4
    08:26
  • 1. Checking PSRemoting using C#.mp4
    06:18
  • 1. all code snippets.html
  • Description


    Learn how to enumerate active directory domain stealthily

    What You'll Learn?


    • Active Directory Enumeration
    • Creating a powershell script loader
    • Automating the finding of misconfigurations
    • Leveraging .NET for stealthy enumeration

    Who is this for?


  • Penetration Testers
  • Red Teamers
  • Blue Teamers
  • Administrators
  • What You Need to Know?


  • Little bit of Active Directory basics can be useful but not mandatory
  • More details


    Description

    In this course, you will learn how to enumerate domain information using c# stealthily.

    Active Directory (AD) is a directory service developed by Microsoft for Windows domain networks. It is a centralized repository that stores information and settings about a network's resources, such as users, groups, computers, printers, and more. Active Directory provides a single sign-on and centralized authentication and authorization mechanism, making it easier to manage and secure resources within a network.

    Enumerating the AD is the most important part in any ad pentesting.

    First we kickstart with writing a powershell loader that bypasses amsi, constrained languagemode and can even retrieve the ps scripts from url and execute them.

    Then we do enumeration of some juicy domain info using c# like finding kerberoastable accounts, delegated accounts, dcsync accounts and much more.

    we also see how to find juicy ACLs to find RBCD capable users etc

    Finally we write our own psremoting checking script which checks for local admin access on any of the computers in the specified domain.

    there are so many powershell shenanigans like iex execution, obfuscation to bypass defender etc.

    but we will focus mainly with c#.

    i used ps1loader and these binaries in one of my recent certifications without having to do some modifications to registry etc which course taught.

    this  course is for pentesters, redteamers and anyone who want to tackle with active directory domain enumeration.

    all of the code is given at the end of the course.


    Who this course is for:

    • Penetration Testers
    • Red Teamers
    • Blue Teamers
    • Administrators

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Naga Sai Nikhil
    Naga Sai Nikhil
    Instructor's Courses
    I am computer science student who also had interest in infosec . I have knowledge of Exploit Development, Penetration Testing and Secure Coding.I had few certifications - eJPT and OSCP . I use python to automate some of my tasks I created some small tools to Automate Excel tasks, Network Recon namely Excelator , PySQLi and few automation scripts
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 8
    • duration 1:26:13
    • Release Date 2024/03/19