Auditing Windows Active Directory for Weak Passwords - Dumping Hashes From Domain Controller

Поделиться
HTML-код
  • Опубликовано: 26 окт 2024

Комментарии • 21

  • @Stellar_AI_History
    @Stellar_AI_History 2 года назад

    Really great video man! Keep up the great work bro

  • @dimosvavaitis8653
    @dimosvavaitis8653 Год назад

    Thank you very much! That video is really helpful!

  • @professorblackops-cybersec1168
    @professorblackops-cybersec1168 3 года назад

    Great video.. Using the Azure AD Password Protection for Active Directory Domain Services to set password complexity, history, reuse, and dictionary of common terms to block weak password.

    • @InfiniteLogins
      @InfiniteLogins  3 года назад

      Fantastic! Do you have a video showing how to do this?

    • @professorblackops-cybersec1168
      @professorblackops-cybersec1168 3 года назад

      @@InfiniteLogins I just have overview and general information and security checks. July I'm going to do labs in AWS showing the best practice. You are the role model.

    • @InfiniteLogins
      @InfiniteLogins  3 года назад

      Can't wait to see em.

    • @TheStevenWhiting
      @TheStevenWhiting Год назад +1

      If you get people to change passwords they'll end up writing them down, making them weaker. They should just be strong and never expire.

  • @arunkrishna1854
    @arunkrishna1854 3 года назад

    Keep posting mate

  • @mrshhh
    @mrshhh 3 года назад +1

    🤩🤩🤩🤩

  • @cyberjack
    @cyberjack Год назад

    What if you don't have admin rights on system or domain

  • @ronburgundy1033
    @ronburgundy1033 9 месяцев назад

    How do we find the domain controller name

  • @WilliamKibirango
    @WilliamKibirango 3 года назад

    HAMAZING!!!

  • @Trent_111
    @Trent_111 2 года назад

    What are some other ways that you would transfer the files from rdp

    • @InfiniteLogins
      @InfiniteLogins  2 года назад

      Google "Windows file transfer cheat sheet". I have a blog post.

  • @TheCynicsCorner1
    @TheCynicsCorner1 2 года назад

    Do you have to separate the different hashes from that file?

    • @InfiniteLogins
      @InfiniteLogins  2 года назад

      Just make sure the hashes are the same format and you'll be able to throw them right into hashcat.

  • @sybily_du7456
    @sybily_du7456 2 года назад

    What's the point of getting the hash if you already know the password?

    • @InfiniteLogins
      @InfiniteLogins  2 года назад

      You don't already know the password. You just have a large list. You could password spray instead and try to sign in using each password until the sign-in is successful, but then account lockouts occur due to password policies.