Главная
Study mode:
on
1
Introduction
2
What We’ll Be Covering
3
What is Credential Access?
4
Mitre Attack Techniques - Credential Access
5
Let’s Get Started
6
What is mimikatz?
7
Using mimikatz with our High Integrity Agent
8
Are There Any Login Passwords in Memory?
9
Using lsadump
10
Using the meterprater
11
Preparing the mimikatz Binaries
12
Dumping the Login Passwords
13
Using hash dump
14
Loading mimikatz with load_kiwi
15
Using the lsa_dump_sam and lsa_dump_secrets Command
16
Results from the Powershell Agent
17
Using the mimikatz-cache Module
18
Locating Our unattended.xml File
19
Uploading the Binary to the Target
20
Listing Login Sessions
21
Our Second Windows Target
22
Running mimikatz Modules using Starkiller
23
Listing Tokens We Can Impersonate
24
Uploading mimikatz
25
Using logonpasswords
26
Using lsadump::sam
27
Using sekursla::logonpasswords
28
Using the Windows Credentials Editor
29
Using hashdump
30
Using johntheripper
31
Conclusion
Description:
Explore Windows Red Team credential access techniques in this comprehensive 41-minute video from the HackerSploit Red Team series. Dive into the concept of credential access and its importance in cybersecurity. Learn about various tools and methods used for stealing credentials, including mimikatz, meterpreter, and Windows Credentials Editor. Discover how to use these tools to dump login passwords, extract hashes, and exploit vulnerabilities in Windows systems. Gain hands-on experience with practical demonstrations on multiple Windows targets, covering techniques such as keylogging, credential dumping, and token impersonation. Understand how to leverage the Mitre ATT&CK framework for credential access and explore advanced topics like using John the Ripper for password cracking. Perfect for cybersecurity professionals and enthusiasts looking to enhance their red team skills and understand the intricacies of Windows credential access techniques.

Windows Red Team Credential Access Techniques - Red Team Series

Linode
Add to list
0:00 / 0:00