Главная
Study mode:
on
1
Intro
2
The Libraries
3
Live Demo
4
Invoke the Program
5
Password Spring
6
Spidering
7
Authentication
8
Admin Acts
9
Payload Modules
10
Mimicat execution
11
Authentication locally
12
Execution locally
13
Execution on VMs
14
Database
15
Credentials
16
Modules
17
Shells
18
Reverse HTTP Handler
19
Invoke Shell
20
Module Training
Description:
Explore the powerful capabilities of CrackMapExec for Active Directory penetration testing in this comprehensive conference talk from Derbycon 2016. Dive into the tool's libraries, witness live demonstrations, and learn advanced techniques for password spraying, spidering, and authentication. Discover how to perform admin actions, leverage payload modules, and execute Mimikatz. Gain insights into local and remote execution, database credential handling, and the use of various modules. Master the art of creating shells, implementing reverse HTTP handlers, and invoking shell modules. Enhance your cybersecurity skills with this in-depth exploration of CrackMapExec's features for owning Active Directory environments.

CrackMapExec Owning Active Directory by Using Active Directory

Add to list
0:00 / 0:00