Русские видео

Сейчас в тренде

Иностранные видео


Скачать с ютуб Real World Windows Pentest Tutorial (demos of Top 5 Active Directory hacks) в хорошем качестве

Real World Windows Pentest Tutorial (demos of Top 5 Active Directory hacks) 1 месяц назад


Если кнопки скачивания не загрузились НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием, пожалуйста напишите в поддержку по адресу внизу страницы.
Спасибо за использование сервиса savevideohd.ru



Real World Windows Pentest Tutorial (demos of Top 5 Active Directory hacks)

A big shoutout to TCM Security for sponsoring this video. Register now to receive a 50% discount on your first month at the TCM Security Academy, potentially making your most significant step toward a career in ethical hacking. Go here: https://davidbombal.wiki/3vQsqWm // TCM Security SOCIAL// LinkedIn :   / tcm-security-inc   Twitter :   / tcmsecurity   YouTube (The Cyber Mentor):    / thecybermentor   Discord:   / discord   Instagram:   / tcmsecurity   Facebook:   / tcmsecure   TikTok:   / tcmsecurity   Academy Website: https://academy.tcm-sec.com/ TCM Certifications: https://certifications.tcm-sec.com/ Discord:   / discord   Website: https://tcm-sec.com/ Breach Point Website: https://breachpoint.com/ // Heath Adam’s SOCIAL // LinkedIn:   / heathadams   // Resources REFERENCE // How to build and active directory hacking lab online:    • How to Build an Active Directory Hack...   // David's SOCIAL // Discord:   / discord   X:   / davidbombal   Instagram:   / davidbombal   LinkedIn:   / davidbombal   Facebook:   / davidbombal.co   TikTok:   / davidbombal   YouTube:    / @davidbombal   // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: [email protected] // MENU // 00:00 - Introduction 01:30 - Labs Options 03:03 - How Do The Labs Work? 04:32 - Where Should You Start? 07:25 - TCM Certifications 09:40 - LLMNR Poisining 13:02 - Lab Example #1 (LLMNR Poisoning) 20:15 - Best Defences 21:01 - LLMNR: Mitigation 23:17 - SMB Relay 27:07 - Lab Example #2 (SMB Relay) 39:43 - When To Run Pentest 41:01 - Is Shell Popping Necessary? 43:43 - Why You Should Have A Pentest 46:09 - SMB Relay Mitigation 48:18 - Lazy Security 49:27 - Favourite Password Manager 50:00 - Gaining Shell Access 51:37 - Is IPv6 Common? 56:08 - Should You Disable IPv6? 57:04 - Do Large Organizations Use IPv6 Properly? 57:33 - Lab Example #3 (IPv6) 01:02:04 - As Administrator 01:06:21 - Pentests Are Important 01:07:30 - IPv6 Mitigation 01:09:56 - Pass The Password / Pass The Hash 01:14:00 - The CME DB 01:14:32 - Lab Example #4 (The CME DB) 01:19:15 - Pass The Hash / Pass the Password Mitigation 01:20:12 - Real World VS CTFs 01:21:35 - Kerberoasting 01:24:11 - Lab Example #5 (Kerberoasting) 01:26:38 - Kerberoasting Mitigation 01:27:50 - Are Window's 'Default Settings' Safe? 01:28:53 - Reach Out to TCM Security 01:29:16 - Real Life Pentest Case Studies 01:35:18 - Lab VS Real World 01:37:15 - How To Access The Internal Network 01:39:30 - Where To Get Started 01:41:11 - Conclusion 01:41:46 - Outro pentest pentester hack hacker hacking ethical hacking ethical hacker course ethical hacker windows ad hacking microsoft windows microsoft windows hack windows 11 hack windows 11 hacking Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only. #hacker #pentester #microsoft

Comments