Главная
Study mode:
on
1
Introduction
2
Agenda
3
Why PowerShell
4
What is Active Directory
5
Why not use PowerShell
6
PowerView
7
Pipeline
8
Identifying and Hunting
9
Powershell Commandments
10
VOC User Hunter
11
Stealth User
12
Raw Data
13
Local Admin Enumeration
14
Local Group Enumeration
15
Process
16
GPO Abuse
17
Group Policy Preferences
18
Get GPP Password
19
Get Organizational Units
20
Group Policy Objects
21
Fine GPO Location
22
Active Directory CL
23
Active Directory ACL
24
Invoke ACL Scanner
25
Admin SD Holder
26
Downgrades
27
Power View
28
Domain Trust
29
Why Trust Matters
30
Trust Enumeration
31
Trust Mesh
32
Map Domain Trust
33
Domain Trust Explorer
34
CID histories
35
Golden Tickets
36
Kerberos
37
Trustpocalypse
38
Cheat Sheets
39
Credits
40
Questions
Description:
Explore offensive Active Directory techniques using PowerShell in this 50-minute conference talk. Dive into the world of PowerShell and Active Directory, understanding their significance in cybersecurity. Learn about PowerView, pipeline operations, and user hunting techniques. Discover methods for identifying stealth users, enumerating local admins and groups, and exploiting Group Policy Objects (GPOs). Gain insights into Active Directory Access Control Lists (ACLs), domain trusts, and advanced attack techniques like Golden Tickets and Kerberos exploitation. Acquire valuable cheat sheets and engage in a Q&A session to enhance your understanding of offensive Active Directory strategies.

Offensive Active Directory with PowerShell

WEareTROOPERS
Add to list
0:00 / 0:00