وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

Attacking And Defending Active Directory: AD Pentesting

سرفصل های دوره

Explore Active Directory Pentesting: Attack, Defend, and Secure. Master Active Directory Pentesting


1. Introduction
  • 1. Introduction

  • 2. Active Directory Basics
  • 1.1 1. Active Directory Basics.pdf
  • 1. Active Directory Basics
  • 2. Task
  • 3. Quiz.html

  • 3. Active Directory Authentication
  • 1.1 2. Active Directory Authentication.pdf
  • 1. Active directory authentication overview
  • 2. Hashing algorithms in windows
  • 3. Kerberos basics
  • 4. Components of kerberos
  • 5. kerberos explanation with diagram
  • 6. Difference between NTLM and kerberos authentication
  • 7. Group policy in active directory
  • 8. Task
  • 9. Quiz.html

  • 4. Active Directrory Pentesting Lab Setup
  • 1.1 3. Active Directory Lab Setup.pdf
  • 1. Overview of lab setup
  • 2. Necessary files for lab setup
  • 3. Domain controller installation and setup
  • 4. Windows client installation
  • 5. Domain Controller configuration
  • 6. Joining computers with domain controller
  • 7. Clinet machines configuration
  • 8. Client machines configurations -2

  • 5. Powershell Basics and File Transfer Basics
  • 1.1 5. Powershell Basics and File Transfer Basics.pdf
  • 1. Powershell overview
  • 2. Powerhsell commands practical
  • 3. File transfer methods overview
  • 4. File transfer practical
  • 5. Quiz.html

  • 6. Breaching In Active Directory
  • 1.1 4. Breaching In Active Directory.pdf
  • 1. Breaching overview
  • 2. OSINT and phishing
  • 3. Initial access using web attacks
  • 4. LLMNR poisoning overview and mitigations
  • 5. LLMNR poisoning practical attack using SMB
  • 6. LLMNR poisoning practical attack using WPAD
  • 7. SMB relay attack overview and mitigations
  • 8. SMB relay attack practical
  • 9. AS-REP Roasting overview
  • 10. AS-REP Roasting practical attack
  • 11. PasswordSpray attack overview
  • 12. PasswordSpray attack practical
  • 13. More methods of initial access on AD
  • 14. Breaching mitigations
  • 15. Quiz.html

  • 7. Enumeration In Active Directory
  • 1.1 6. Enumeration In Active Directory.pdf
  • 1. Enumeration in active directory overview
  • 2. Enumeration using powershell native commands
  • 3. PowerView overview
  • 4. PowerView - 1
  • 5. Lab Update
  • 6. PowerView - 2
  • 7. PowerView - 3
  • 8. BloodHound overview
  • 9. BloodHound Practical
  • 10. AD lab troubleshooting
  • 11. Task
  • 12. Quiz.html

  • 8. Lateral Movement In Active Directory
  • 1.1 7. Lateral Movement In Active Directory.pdf
  • 1. Lateral movement overview
  • 2. Pass-the-hash attack overview and mitigations
  • 3. Pass-the-hash attack practical
  • 4. Pass-the-ticket overview
  • 5. Pass-the-ticket attack practical
  • 6. Overpass-the-hash overview
  • 7. Overpass-the-hash attack practical
  • 8. RDP Hijacking overview
  • 9. RDP Hijacking attack practical
  • 10. Task
  • 11. Quiz.html

  • 9. Pivoting
  • 1.1 8. Pivoting In Active Directory.pdf
  • 1. Pivoting intro
  • 2. Lab setup overview
  • 3. Chisel intro
  • 4. Pivoting practical
  • 5. Quiz.html

  • 10. Exploitation In Active Directory
  • 1.1 9. Exploitation In Active Directory.pdf
  • 1. Exploitation overview
  • 2. Kerberosting overview
  • 3. kerberosting Practical
  • 4. Exploiting permission delegation overview #1
  • 5. Exploiting permission delegation practical #1
  • 6. Exploiting permission delegation overview #2
  • 7. Exploiting permission delegation practical #2
  • 8. Group memebership abuse overview #1
  • 9. Group memebership abuse practical #1
  • 10. Group memebership abuse overview #2
  • 11. Group memebership abuse practical #2
  • 12. More on group membership abuse
  • 13. GPO abuse overview
  • 14. GPO abuse practical
  • 15. Extracting logged on admins hashes
  • 16. Printnightmare attack overview
  • 17. Printnightmare attack practical
  • 18. Zerologgon attack overview
  • 19. Zerologgon attack practical
  • 20. Keberos delegation overview
  • 21. Task
  • 22. Quiz.html

  • 11. Persistance In Active Directory
  • 1.1 10. Persistence In Active Directory.pdf
  • 1. Persistance overview
  • 2. Golden and silver ticket attack overview and mitigations
  • 3. Golden and silver ticket attack practical
  • 4. Diamond ticket attack overview
  • 5. Diamond ticket attack practical
  • 6. DCSync overview
  • 7. DCSync attack practical
  • 8. DSRM abuse overview
  • 9. DSRM Abuse practical
  • 10. GPO for persistance
  • 11. Task
  • 12. Quiz.html

  • 12. Bonus Lecture
  • 1.1 Active Directory Cheatsheet.html
  • 1.2 Attacking AD.html
  • 1.3 WADComs.html
  • 1. Bonus lecture
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    افزودن به سبد خرید
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    مدرس:
    شناسه: 30283
    حجم: 3795 مگابایت
    مدت زمان: 502 دقیقه
    تاریخ انتشار: ۲ اسفند ۱۴۰۲
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید