Active Directory Exploitation and Lateral Movement Black-Box

Udemy

What you’ll learn

  • Learn how to enumerate information from Active Directory, including users, groups, computers, and trust relationships. Understand the importance of information
  • Learn how to abuse some active directory intended functionality to established foothold and escalate privilege
  • Identify common attack vectors in Active Directory, such as misconfigurations, weak passwords, and insecure group memberships. Understand how attackers exploit
  • Understand the importance of reconnaissance in penetration testing. Learn to use tools for AD reconnaissance, such as BloodHound and PowerView.
  • Explore common vulnerabilities in Active Directory, such as pass-the-hash attacks, Kerberoasting, and DCSync attacks.
  • Understand post-exploitation activities, including lateral movement and privilege escalation.
  • Understand the concept of trusts in Active Directory and how they can be exploited
  • Learn about common trust-based attacks, such as Golden Ticket attacks.
  • Student will learn how to build active directory lab create forests and trust between forests
Active Directory Exploitation and Lateral Movement Black-Box
Active Directory Exploitation and Lateral Movement Black-Box

eLearn
Logo