Attacking Active Directory - Kerberoasting

Поделиться
HTML-код
  • Опубликовано: 27 ноя 2024

Комментарии • 57

  • @plugandplayreviews
    @plugandplayreviews 3 года назад +13

    CONDA is the best infosec RUclipsr of all time. Respect bro!!

    • @c0nd4
      @c0nd4  3 года назад +1

      Thanks so much!

  • @ElCyberWizard
    @ElCyberWizard 2 года назад +3

    I’ve been working on my GPEN cert and your content has been very helpful with tying everything together at the end of each section!

  • @Xx-nd1rs
    @Xx-nd1rs Год назад +1

    I like the way you explain things, very simple, clear, informative, organized and get to the point. thanks a loot!

    • @c0nd4
      @c0nd4  Год назад

      Thank you!

  • @x7331x
    @x7331x 8 месяцев назад +1

    Great on-point explanation of the attack 👏

  • @csheldon3636
    @csheldon3636 Год назад

    Excellent video. A lot easier than the OSCP explanation.

  • @harshil.
    @harshil. 3 года назад +5

    Great video bro definitely enjoyed it the whole way through. I'm sure this video will get a bunch of traction now that AD is on the OSCP lmao

    • @c0nd4
      @c0nd4  3 года назад

      I appreciate it!

    • @morality1995
      @morality1995 2 года назад +4

      I'm literally watching this video prepping to take the new OSCP exam lol

  • @Stephanus21
    @Stephanus21 Год назад +1

    Thank you , just started to watch your stuff and you do an amazing job of showing and explaining exactly how it works , thank you so much!

    • @c0nd4
      @c0nd4  Год назад +1

      Thank you!

  • @dawnS33ker
    @dawnS33ker 2 года назад +1

    Very clear and concise video. Thank you Brandon,

  • @randomguy3784
    @randomguy3784 3 года назад +2

    Neat and Comprehensive presentation!
    Great work man.

    • @c0nd4
      @c0nd4  3 года назад +1

      Thank you!

  • @crash9706
    @crash9706 3 года назад +2

    Yesss more AD. Love the content. Keep it up ❤️

    • @c0nd4
      @c0nd4  3 года назад

      Thanks! I appreciate it

  • @offlife77
    @offlife77 3 года назад +1

    Awesome mate, keep them coming!

  • @heibai0139
    @heibai0139 Год назад +1

    Great video, much helper than OSCP 23' course materials, appreciate

  • @Eggsec
    @Eggsec 2 года назад +1

    Thank you for the valuable information much appreciated.

  • @chrislearnsIT
    @chrislearnsIT 2 года назад +1

    Thanks for the high quality content! I just subscribed.

    • @c0nd4
      @c0nd4  2 года назад

      Thank you!

  • @teedeearr
    @teedeearr Год назад

    I found this very informative. Thanks

  • @jcgm666
    @jcgm666 3 года назад +1

    Very good explanation! Subscribed

    • @c0nd4
      @c0nd4  3 года назад

      Thank you!

  • @ca7986
    @ca7986 3 года назад +1

    You are awesome mate! Gold videos. ❤️

    • @c0nd4
      @c0nd4  3 года назад

      Thank you! Really appreciate it

  • @real.xplo1t
    @real.xplo1t 3 года назад +1

    Perfect explanation

    • @c0nd4
      @c0nd4  3 года назад +1

      Thank you!

  • @quentingauthier430
    @quentingauthier430 3 года назад +2

    Dude, you make awesome videos

    • @c0nd4
      @c0nd4  3 года назад

      Thank you! I really appreciate the support

  • @aahringer
    @aahringer Год назад

    Well done! Thank you!

  • @DanEather
    @DanEather 2 года назад

    Great vid. Clearly presented. Thanks!

  • @jaylal4899
    @jaylal4899 3 года назад +2

    Very good video! It's much easier to understand kerberoasting with a practical example. Any chance you can make a video on how to compile windows kernel exploits using Visual Studio?

  • @vikassrivastava2058
    @vikassrivastava2058 2 года назад

    Great content

  • @enleak
    @enleak 3 года назад +1

    Lets goo!

  • @GodlyTank
    @GodlyTank Год назад

    Thanks a bunch for this

  • @Umar0x01
    @Umar0x01 3 года назад +1

    Best!!!

  • @adamraserovaquera
    @adamraserovaquera 10 месяцев назад

    11:18 A question here, how can yo know that what etype you are searching for is the TGS-REP 23 and not lets say... the TGS-REP 18 that its at its side?

  • @underrated_mono9770
    @underrated_mono9770 Год назад

    If hostname of the SPN "DC-1" is replaced with another hostname, does it affect the Kerberoasting operation here?

  • @aahringer
    @aahringer Год назад

    Thanks!

    • @c0nd4
      @c0nd4  Год назад

      Thank you so much! Very kind of you!

  • @quad7375
    @quad7375 Год назад

    can you go over more AD attacks, golden ticket, silver, dc sync, etc

  • @danielriofrio199
    @danielriofrio199 2 года назад

    Hey! I was wondering if you could explain something to me please:
    Per MITRE ATTACK definition of kerberoasting: "Portions of these tickets may be encrypted with the RC4 algorithm, meaning the Kerberos 5 TGS-REP etype 23 hash of the service account associated with the SPN is used as the private key and is thus vulnerable to offline Brute Force attacks that may expose plaintext credentials."
    This will result in windows log eid 4769 with encryption type 0x17.
    Is this the only time that this is dangerous? Only if this type of encryption was used?
    Working on a SIEM alarm to detect potential malicious kerberoasting :)

  • @shermanlaw5223
    @shermanlaw5223 16 дней назад

    How come you used John account and not the new sql account you created?

  • @matiashuartamendia7977
    @matiashuartamendia7977 Год назад

    is it really NTLM hash inside the service account? I think that RC4 etype encrpytion of that password is equal to NTLM Hash, but AES-128 or AES-256 is completely different. Hashcat would take a LOT of time to decrypt it if password is strong enough.

  • @ajayk643
    @ajayk643 3 года назад +1

    Subscribed :) :)

  • @DinoDulayAwil
    @DinoDulayAwil 2 года назад

    Does the tool execution leave some footprint on the server for detection?

    • @DinoDulayAwil
      @DinoDulayAwil 2 года назад

      I understand it requires a compromised account (normal account will do), can we use other abuse technique that does not require one? A different vector somehow. Thanks.

    • @c0nd4
      @c0nd4  2 года назад +1

      The most common way I've seen this vector detected is from SPN enumeration. If you made a request to list all SPNs, some EDR programs may catch it.

  • @eanglyroeurn8255
    @eanglyroeurn8255 3 года назад

    Bro Please help to create more video relate to AD attack, I knew that me and someone here will need that resource for OSCP fighting.

  • @giovanniguarino588
    @giovanniguarino588 3 года назад

    Thank you for your explaination, but this is a very little part of kerberoasting.

  • @redreacts2388
    @redreacts2388 Год назад +1

    I'm taking a course right now that I paid for, but this was a far better explanation on how to exploit this vulnerability.....smh