Learn Active Directory Pentesting for RedTeaming - Part 1

dkmdkm

U P L O A D E R
d2b4feaf94225bf918e5ce7eaf6de313.jpg

Free Download Learn Active Directory Pentesting for RedTeaming - Part 1
Last updated 9/2023
Created by Karan Kumar
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Genre: eLearning | Language: English | Duration: 116 Lectures ( 15h 29m ) | Size: 6 GB

Learn and Practice the Techniques of Active Directory Pentesting and go from Beginner to Intermediate Level.
What you'll learn
Learn the Theory behind the Attacks
Lab Setup for AD Pentesting
Unofficial prep for exams like OSCP, PNPT, CPTS, CRTP, CRTO
Local Enumeration
Local Privilege Escalation
Domain Privilege Escalation
Lateral Movement
Domain Enumeration
Post Exploitation
Persistence Techniques
BloodHound
PowerView
Rubeus
Impacket Tools
Mimikatz
File Transfer Techniques
Metasploit
Requirements
Course is designed for absolute beginners. Medium/Expert level people can use this course to level up their knowlegde.
No requirements/prerequisites.
16 GB RAM needed if you want to build the lab setup.
Description
This course is aimed at beginners who want to learn windows pentesting from basics.This course teaches Persistence and Lateral Movement techniques in-depth.After this course , you will have good understanding of how to approach a Windows machines from a Red-Team's Perspective. This course covers AD enumeration, privilege escalation, persistence, Kerberos attacks like delegation attacks, silver ticket, golden ticket, diamond ticket etc.The course simulate real world attack and we go from a normal user account in the domain and escalate privileges to Domain admin. The focus is on exploiting the different types of attacks that most malicious hackers in the world follow. This course is designed to provide security professionals to practice in a Windows 10 machine. The course is beginner friendly and will be suited for both students and experienced professionals. We will go from the port enumeration and understand how to enuemrate the ports.When it comes to AD security, there is a large gap of knowledge which security professionals and administrators struggle to fill. Over the years, I have taken numerous world trainings on AD security and always found that there is a lack of quality material and specially, a lack of good walkthrough and explanation.
Who this course is for
Students who wants to become a Good-Red Teamer.
Students who already know windows pentesting but want to understand better about the theory behing the attacks.
Students who are starting/aspiring to become a Red Teamer.
Students who want to do learn about windows security
Homepage
Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!






Recommend Download Link Hight Speed | Please Say Thanks Keep Topic Live
Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
No Password - Links are Interchangeable
 
Kommentar
537368816_que-es-udemy-analisis-opiniones.jpg

6 GB | 55min 4s | mp4 | 1920X1080 | 16:9
Genre:eLearning |Language:English


Files Included :
1 - Introduction.mp4 (11.85 MB)
3 - What is Active Directory.mp4 (7.62 MB)
4 - Why Active Directory.mp4 (12.17 MB)
5 - Pentesting vs Red Team.mp4 (25.94 MB)
6 - Lab OverView.mp4 (5.06 MB)
7 - Installing VMWare Workstation.mp4 (7.9 MB)
8 - Installing Kali Machine.mp4 (31.12 MB)
9 - Installing DC - Domain Controller.mp4 (73.06 MB)
10 - Installing MS01 & MS02 - Client Machine.mp4 (52.45 MB)
11 - Creating GPO for Defender.mp4 (30.43 MB)
12 - Testing All 3 Machines.mp4 (167.86 MB)
13 - Trees Vs Forests.mp4 (19.71 MB)
14 - Creating Users and Groups in Domain Controller.mp4 (17.78 MB)
15 - What is Group Policy Object (GPO).mp4 (18.47 MB)
16 - What is Service Principal Name (SPN).mp4 (29.72 MB)
18 - What is Authentication.mp4 (3.9 MB)
19 - NTLM Authentication.mp4 (15.23 MB)
20 - Kerberos Authentication.mp4 (11.11 MB)
21 - NMAP Scanning.mp4 (45.05 MB)
22 - Port 53 - DNS Enumeration - HTB FriendZone.mp4 (32.8 MB)
23 - Port 88 - Kerberos Enumeration - HTB Mantis.mp4 (101.29 MB)
24 - Port 135 - RPC Enumeration.mp4 (49.35 MB)
25 - Port 139, 445 - SMB Enumeration.mp4 (34.98 MB)
26 - Port 139, 445 - SMB Enumeration using Enum4Linux.mp4 (15.84 MB)
27 - Using SMB to get Interactive Shell.mp4 (11.76 MB)
28 - Port 389, 636 - LDAP Enumeration.mp4 (62.74 MB)
29 - Port 3389 - RDP Session.mp4 (34.31 MB)
30 - Port 5985, 5986 - WinRM Shell.mp4 (4.82 MB)
31 - Downloading and Uploading Using HTTP - PowerShell, Certutil, Wget.mp4 (66.4 MB)
32 - Downloading and Uploading Using SMB.mp4 (24.06 MB)
33 - Downloading and Uploading Using Netcat.mp4 (80.6 MB)
34 - Difference between Vulnerability, Payload, Exploit.mp4 (28.69 MB)
35 - Difference Between Reverse Shell and Bind Shell.mp4 (30.12 MB)
36 - Staged Payload vs Stageless Payload.mp4 (66.72 MB)
37 - Generating Payload Part 1 - Kali Shell.mp4 (10.22 MB)
38 - Generating Payload Part 2 - Meterpreter Shell.mp4 (56.86 MB)
39 - Introduction.mp4 (4.6 MB)
40 - LLMNR Poisoning.mp4 (142.16 MB)
41 - RDP MiTM.mp4 (65.8 MB)
42 - LDAP Relay Attack.mp4 (73.29 MB)
43 - SMB Relay Attack.mp4 (17.46 MB)
44 - HTML Application (HTA) - Getting Shell via HTA.mp4 (18.24 MB)
45 - DOC File - Shell via Malicious Macro.mp4 (32.36 MB)
46 - Javascript (JS) - Getting Shell via JS.mp4 (16.69 MB)
47 - Part 1 - Domain, SID, Domain Policy, Domain Controller.mp4 (26.14 MB)
48 - Part 2 - Users, Computers, Groups.mp4 (77 MB)
49 - Part 3 - GPO, Process, Shares, Files.mp4 (42.54 MB)
50 - Part 4 - Hostnames, Admin Access, Active Session.mp4 (17.58 MB)
51 - Part 5 - Service Principal Names, ASREPRoast, Kerberoast.mp4 (17.59 MB)
53 - Types of Accounts in Windows and Types of Prvilege Escalation.mp4 (76.67 MB)
54 - Always Install Elevated.mp4 (39.75 MB)
55 - Unquoted Service Paths.mp4 (202.17 MB)
56 - Weak Service Permissions.mp4 (53.47 MB)
57 - Weak Service Binary Permissions.mp4 (20.68 MB)
58 - Powershell history.mp4 (15.88 MB)
59 - SeImpersonation - SeAssignPrimaryTokenPrivilege.mp4 (15.88 MB)
60 - Automated Enumeration using WinPeas.mp4 (85.84 MB)
63 - Pivoting Lab Setup.mp4 (35.13 MB)
64 - Local Port Forwarding - Practical Example.mp4 (220.03 MB)
65 - Remote Port Forwarding - Practical Example.mp4 (110 MB)
67 - Pass The Hash.mp4 (54.08 MB)
68 - Credential Dumping - SAM.mp4 (55.19 MB)
69 - Credential Dumping - LSA.mp4 (60.86 MB)
70 - Credential Dumping - NTDS.mp4 (28.75 MB)
71 - Credential Dumping - DCSync.mp4 (27.72 MB)
72 - Kerberoasting.mp4 (236.74 MB)
73 - Pass The Ticket.mp4 (45.3 MB)
74 - Over Pass The Hash.mp4 (33.72 MB)
75 - Over Pass The Hash using Rubeus.mp4 (91.41 MB)
76 - Domain Cached Credentials.mp4 (39.99 MB)
77 - AS-Rep Roasting.mp4 (107.75 MB)
78 - DCOM - Distributed Component Object Model.mp4 (8.92 MB)
79 - Powershell Remoting.mp4 (16.72 MB)
80 - PSExec.mp4 (6.57 MB)
82 - DSRM.mp4 (96.74 MB)
83 - AdminSDHolder - Theory.mp4 (37.27 MB)
84 - AdminSDHolder Practical.mp4 (18 MB)
85 - Silver Ticket Attack.mp4 (82.57 MB)
86 - Golden Ticket Attack.mp4 (40.11 MB)
87 - Diamond Ticket Attack.mp4 (13.34 MB)
89 - Screensaver Hijack.mp4 (29.2 MB)
90 - Modifying Shortcuts.mp4 (17.91 MB)
91 - Task Scheduler.mp4 (35.8 MB)
92 - Startup Folder.mp4 (13.52 MB)
93 - Registry AutoRun.mp4 (18.23 MB)
94 - Adding Ourselves to Administrator Group.mp4 (5.93 MB)
96 - Uncontrained Delegation.mp4 (300.52 MB)
97 - Contrained Delegation.mp4 (250.37 MB)
98 - Creating User Names.mp4 (17.17 MB)
99 - Creating Password using Custom Rules.mp4 (15.78 MB)
100 - Cracking ASREP-Roast Hash using HashCat.mp4 (11.37 MB)
101 - CrackMapExec - Password and Hash (For Spraying).mp4 (49.49 MB)
102 - Port 5985 EvilWinRM - Password and Hash (For Login).mp4 (4.11 MB)
103 - Port 445 SMB PsExec - Password and Hash (For Login).mp4 (2.74 MB)
104 - Port 3389 XfreeRDP - Password and Hash (For Login).mp4 (11.93 MB)
105 - Host Identification and Ports Scanning.mp4 (33.14 MB)
106 - Using NMAP in Metasploit.mp4 (4.75 MB)
107 - Pivoting in Metaploit.mp4 (40.03 MB)
108 - Managing Multiple Sessions.mp4 (17.02 MB)
109 - Privilege Escalation - Exploit Suggester.mp4 (71.1 MB)
110 - Privilege Escalation - GetSystem.mp4 (3.84 MB)
111 - Mimikatz.mp4 (90.81 MB)
112 - File Transfer in Metaploit.mp4 (10.64 MB)
113 - BloodHound.mp4 (111.1 MB)
114 - Active - Part 1.mp4 (200.09 MB)
115 - Active - Part 2.mp4 (54.71 MB)
116 - Forest.mp4 (587.75 MB)
117 - Sauna.mp4 (306.41 MB)
]
Screenshot
2kRTCFBo_o.jpg


RapidGator
Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
NitroFlare
Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
DDownload
Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
 
Kommentar

In der Börse ist nur das Erstellen von Download-Angeboten erlaubt! Ignorierst du das, wird dein Beitrag ohne Vorwarnung gelöscht. Ein Eintrag ist offline? Dann nutze bitte den Link  Offline melden . Möchtest du stattdessen etwas zu einem Download schreiben, dann nutze den Link  Kommentieren . Beide Links findest du immer unter jedem Eintrag/Download.

Data-Load.me | Data-Load.ing | Data-Load.to | Data-Load.in

Auf Data-Load.me findest du Links zu kostenlosen Downloads für Filme, Serien, Dokumentationen, Anime, Animation & Zeichentrick, Audio / Musik, Software und Dokumente / Ebooks / Zeitschriften. Wir sind deine Boerse für kostenlose Downloads!

Ist Data-Load legal?

Data-Load ist nicht illegal. Es werden keine zum Download angebotene Inhalte auf den Servern von Data-Load gespeichert.
Oben Unten