Главная
Study mode:
on
1
- Welcome
2
- Lesson overview
3
- Downloading our ISOs
4
- Installing Windows Server 2016 and Windows 10
5
- Renaming Windows Server 2016
6
- Installing VMWare Tools on Server 2016
7
- Finishing Windows 10 install
8
- Installing Active Directory Domain Services / Downtime Q&A
9
- Creating our first domain user
10
- Installing VMWare Tools on Windows 10 / Renaming Windows 10
11
- Joining Windows 10 machine to domain
12
- Setting up a SMB share
13
- LLMNR/NBT-NS poisoning overview
14
- Using Responder to capture NTLMv2 hashes
15
- Cracking NTLMv2 hashes with Hashcat
16
- LLMNR poisoning defenses
17
- Will you ever do a stream on stack overflows?
18
- What is the success rate of LLMNR?
19
- Problems with turning LLMNR off?
20
- Can you place the mitigation slide back up?
21
- How much should you spend on a password cracking rig?
22
- Cobalt vs Metasploit vs Empire - your favorite?
23
- How do you obfuscate Meterpreter?
24
- Does Veil still work?
25
- host-apd or eap hammer?
26
- Has a customer ever intentionally prevented you from doing your job?
27
- Favorite podcasts?
28
- Do you put exploited users in a report? Worried about their firing?
29
- When is your Many Hats appearance coming out?
30
- HackerOne? Bug bounties?
31
- Are you married?
32
- Bug bounties continued
33
- New unconstrained delegation exploit?
34
- OWA spraying and lockout
35
- Favorite bug bounty?
36
- Ever crashed anything on a test?
37
- Funny pentest stories?
38
- Opinion on the cloud and future pentest demand?
39
- What are you looking for when you hire a pentester?
40
- Is pentesting looked down upon?
41
- I want to be a pentester because it's intense, is that a good reason?
42
- What is the OSCP good for?
43
- Thoughts on practical assessments for job hiring?
44
- SOC or Pentesting??
45
- CEH vs OSCP?
46
- Interview process part 2
47
- Salary expectations
48
- Thoughts on CISSP
49
- Salaries revisited
50
- Thoughts on AWAE?
51
- Projects to put on a resume?
52
- Thoughts on WAPT/eWPT?
53
- Home firewalls?
54
- Interview process part 3
55
- eLearnSecurity discussion
Description:
Learn to build an Active Directory lab environment, perform LLMNR poisoning attacks, and crack NTLMv2 hashes using Hashcat in this comprehensive cybersecurity tutorial. Begin by setting up Windows Server 2016 and Windows 10 virtual machines, configure Active Directory Domain Services, and join machines to the domain. Explore SMB share setup and understand LLMNR/NBT-NS poisoning techniques. Practice capturing NTLMv2 hashes with Responder and cracking them using Hashcat. Discover defense strategies against LLMNR poisoning and gain insights into various cybersecurity topics through an extensive Q&A session covering penetration testing, bug bounties, certifications, and career advice in the field of information security.

Building an AD Lab, LLMNR Poisoning, and NTLMv2 Cracking with Hashcat

Cyber Mentor
Add to list