Description
A security expert must be aware of the dangers to the Windows architecture because Windows Active Directory is used to manage the majority of company networks today.
The purpose of Active Directory Pentesting is to give security professionals the knowledge they need to recognize, evaluate, and simulate threats and attacks in a contemporary Active Directory infrastructure.
The walkthrough videos course and all documents with all the commands conducted in the videos are included in the beginner-friendly course.
The training is based on our extensive research and years of expertise breaking Windows and AD setups.
We begin with a non-admin user account in the domain and work our way up to enterprise admin as part of the course's simulation of real-world attack and defense situations.
The emphasis is on using a range of underutilized domain properties rather than just software flaws.
What is Active Directory Pentesting Course?
Microsoft's proprietary directory service is called Active Directory (AD). It works with Windows Server and gives administrators control over access to network resources and permissions.
Data is stored as objects in Active Directory. An object is a discrete component, such as a person, a team, a programme, or a machine like a printer.
Typically, objects are either resources like computers or printers or security principals like users or groups.
Directory objects are categorized by name and properties in Active Directory.
For instance, the name of a user may contain the name string as well as details about the user, like passwords and Secure Shell keys.
Why should you learn this Course?
Security Assessment | Active Directory pentesting evaluates the health of a company's directory service by looking for security holes. |
Red Team Operations | Pentesting helps businesses better imitate real-world attacks and improve their defenses against threats like Active Directory. |
Mitigate Risks | By simulating real-world attacks, or "pentesting," security teams can identify and update vulnerabilities before they can be exploited by hackers. |
Incident Response Preparation | Insights into potential attack vectors are gained by pentesting, which helps with incident response preparation. |
Adherence to Best Practices | By learning Active Directory pentesting, security flaws and vulnerabilities can be reduced and best practices can be implemented. |
Compliance Requirements | Active Directory pentesting is one type of security assessment that is often required to achieve compliance standards set by various industry legislation and standards. |
Security Awareness | Active Directory pentesting promotes a proactive security culture by increasing security awareness among IT staff and stakeholders. |
Continuous Improvement | Organizations may keep one step ahead of evolving threats by conducting regular pentests on their Active Directory. |
Reduces Attack Surface | Finding Active Directory flaws and fixing them makes it more difficult for hackers to breach a network. |
Career Opportunities | Active Directory pentesting expertise is in high demand, therefore security experts who possess it can expect to find better employment prospects. |
What will you require?
- Basic knowledge about active directory
- Experience with Windows server
Active Directory Pentesting Course Syllabus
Introduction
- Course Introduction
Local Escalation and Enumeration
- Enumerating Local User and Groups
- Enumerating the network
- Antivirus and Detections
- Password hunting
- Tools used
- Windows - Version & Configuration
- Sherlock / Watson
- What is CVE-2019-1388
- Privilege Escalation with schedule task
- Unquoted service path
- SEImpersonate
- Privilege Escalation and Local Enumeration - Cheat Sheet
- Hack the Box Windows Machines
Domain Enumeration
- Enumerating Users
- Enumerating Group domain
- Domain Servers / Computer Enumeration
- OU and GPO Enumeration
- Enumerating Domain Shares
- Enumerating ACL
- Active Directory Recon
- BloodHound SettingUp BloodHound
- Basics of BloodHound
- Lateral Movement - User Hunting Domain Enumeration
- Domain Enumeration Cheatsheet
Lateral Movement
- Before Starting
- Kerberos Working
- Offline Cracking - Dumping SAM and SYSTEM
- SAM & LSA with MimiKatz
- PassTheHash with MimiKatz
- Passing the ticket
- Pass the ticket with Rubeus
- Session Hijack
- SMB Relay Attack
- Bypass AMSI with mimidogz
- Bypass Anti Virus Run with mimikatz
- Get dump files - 10 ways
Domain Privilege Escalation
- Before Starting
- ACL - GenericAll on Group
- Priv Esc - DNS Admin
- What is dcsync
- ZeroLogon CVE-2020-1472
- Unconstrained Delegation - Computer
- Constrained Delegation - Computer
- ACL - GenericWrite on User
- SET-SPN - Kerberoast
- AS-REPs- FINDING - Targeted Kerberoasting
- AS-REPs - SET - Targeted Kerberoasting
Domain Persistence and Dominance
- What is DSRM?
- DCShadow - Change Attribute
- DCShadow - SIDHistory
- DCShadow - hash
- Golden Ticket
- Silver Ticket
- AdminSDHolder - Adding Permission
- AdminSDHolder - Abusing Permission
What you’ll learn?
- Red Team Active Directory Hacking
- Exploiting Active Directory
- PowerView PowerShell Module
- Post Exploitation on Active Directory
- Local Privilege Escalation
- Finding Vulnerabilities on Active Directory
- Domain Privilege Escalation
- Active Directory Enumeration
- Active Directory Pre Exploitation
- Domain Persistence and Dominance
Who can enroll Active Directory Pentesting course?
- Students who aspire to become experts in Active Directory Pretesting
- Students interested in learning how to attack Active Directory
- Students interested in working for the Red Team
Active Directory Pentesting Course Duration
- Course Duration
- 250+ Lectures and 42+Hours of on Demand HD Videos
- Certificate of Completion
- 5921+ students enrolled
- Complete Practical Training
- Watch Videos on Android and iOS App, TV, Computer & Tablets