OSCP Practice Lab: Active Directory Attack Path #3 (Advanced/Client-Side Exploits)

Поделиться
HTML-код
  • Опубликовано: 8 янв 2025

Комментарии • 62

  • @0xA
    @0xA Год назад +6

    You have no idea how incredibly helpful this is - working on OSCP challenge labs and keep thinking back to techniques you use in this series. Find myself coming here before my own notes sometimes. Thank you!

  • @uaebikers
    @uaebikers 10 месяцев назад +7

    Just finished the roughly 9 hours videos which I enjoyed so much. I wish the OSCP videos were this engaging.
    You are so talented and I wish you can make more videos. At least once a week. A challenge for you 😀

    • @srijanshrestha6382
      @srijanshrestha6382 3 месяца назад

      Challenge not accepted 😅😅

    • @uaebikers
      @uaebikers 3 месяца назад +1

      @@srijanshrestha6382 Yeah, he disappeared 😑

  • @cosminduduc3016
    @cosminduduc3016 9 месяцев назад +9

    Derron, this is the first content i came across which really helped for my OSCP prep. Besides zillion of HowTo's, learning platforms, etc. I've felt this is the real deal. The way you explain all the details is amazing and I wanted to express my gratitude and thanks for this. It really helped me understand much better the attack vectors in the AD env. Thank you very much man! THANK YOU!

    • @derronc
      @derronc  9 месяцев назад +2

      that is incredibly high praise, thank you so much!! It means a lot and I'm really glad this is helpful for you

  • @DocGMoney
    @DocGMoney 9 месяцев назад +3

    Dude your ability to talk through what your doing is next level. Super helpful and man I am stealing your box setup that's a great way to organize everything. Well done all around and a huge THANK YOU!

  • @sergiocharruadas6518
    @sergiocharruadas6518 Год назад +5

    Very good content as always, can't wait for #4, thank you!

  • @Ibr8kThingz
    @Ibr8kThingz 10 месяцев назад

    Wow this was insanely helpful! I am much more confident now walking into the exam. Thank you so much again for your time and dedication!

  • @heipablishenko851
    @heipablishenko851 11 месяцев назад

    I was unaware of its existence. I am excited to discover what the next instalment in this series will bring.

  • @tkmks8536
    @tkmks8536 Месяц назад

    I have zero thm or htb experience and have to take oscp exam so no idea how to start hacking. But these videos including #1, #2 are incredibly helpful. I hope I'll pass it.

  • @ianp6742
    @ianp6742 Год назад +1

    Heeeeyy glad to see another AD path from you!

  • @spoon2k
    @spoon2k Год назад +2

    Superb content as always, thank you!

  • @ChadB_n00b
    @ChadB_n00b Год назад

    Suggesting these vids to my OSCP study group. Good work!

  • @phillydee3592
    @phillydee3592 3 месяца назад

    This content is awesome man thank you!!I need to build this setup and work through it!!

  • @muhammadmughal4258
    @muhammadmughal4258 Месяц назад

    Thank you so much, awesome and revised many things along with new things learned 🙂 stay blessed,

  • @FastlaneSto
    @FastlaneSto 5 месяцев назад +1

    Will you do more of these? Understand if not doing OSCP anymore, but perhaps any other hacking vids? I love them. I feel like you would do so well teaching this stuff to beginners, as clearly these are more of an intermediate+ level. You're a natural with the videos and commentary.

    • @derronc
      @derronc  4 месяца назад +1

      Thank you for such high praise! 🙏 Life has been keeping me extremely busy this year but I am hoping to create some more content in the near future.

  • @Mabenchi6705
    @Mabenchi6705 Год назад +1

    This is gold, Thank you

  • @asdasd-p6u
    @asdasd-p6u Год назад +1

    Thank you, amazing content!

  • @johnwright6498
    @johnwright6498 Год назад +1

    Very helpful content. I take my oscp test in 2 days. The one I struggle is with web foothold. I'm being better though

    • @derronc
      @derronc  Год назад

      best of luck on the exam!! 🤞

    • @johnwright6498
      @johnwright6498 Год назад

      @@derronc can't talk about it but your technique methodology help me got my first foothold in. I didn't pass I will sign up for hack the box academy and study on the weak areas. And will still look towards your videos. I will get it next time. 🤙🏾

    • @htpeof6943
      @htpeof6943 Год назад

      ​@@johnwright6498how many machines u got

  • @souirianas2571
    @souirianas2571 11 месяцев назад

    keep up the good work maan!

  • @flowerinpower
    @flowerinpower 5 месяцев назад +1

    This is gold!

  • @maroofchaudhary543
    @maroofchaudhary543 Год назад

    Brother amazing content keep it brother and try to upload more content like this

  • @presequel
    @presequel 5 месяцев назад

    fantastic video, awesome :)

  • @Claymore403
    @Claymore403 9 месяцев назад +1

    First thing I have to say is thank you for your videos cause they are amazing, second thing is that I think you can inject macro in doc file directly from kali using minitrue or I think eviloffice (maybe it's useful info for someone)

  • @cooki3cutt3r13
    @cooki3cutt3r13 Год назад

    good sir, you're a wizard

  • @hamzagamal4361
    @hamzagamal4361 8 месяцев назад

    unbelievable keep going 💪💪🔥🔥

  • @SeaTekMonstroso
    @SeaTekMonstroso Год назад

    Great stuff man, my only comment is you should consider using the userpass file options for accounts you already know the passwords for. It will reduce clutter of trying username and password combinations you already know wont work.

    • @derronc
      @derronc  Год назад

      totally agree! I forgot about the userpass option during the recording. Great call out and thank you for watching!

  • @Gonski-Cyber
    @Gonski-Cyber Год назад

    Great content!

  • @TDay666
    @TDay666 Год назад

    Always happy to see these videos come out, I use these to refer some of my team for study purposes, as well as for me to prep for my OSCP coming up soon. Have you made these into an ISO/VM instance for download? would love to have my team try these custom boxes out.

    • @derronc
      @derronc  Год назад

      thank you so much, I'm glad you find these helpful and are sharing them with your team 😊
      I thought about how best to share the lab with everyone and that's how I ended up deciding on the "How to build..." videos. Unfortunately MSFT licensing doesn't work well with trying to package up the images into an ISO/VM for public consumption

  • @eniak2300
    @eniak2300 7 месяцев назад

    Hey bro you have such an amazing methodologies and your explanations are insane. But can I ask you where did you find those labs you are doing in these videos or you just built them? Also thank you really for this content !!

  • @CyberNinja-p1t
    @CyberNinja-p1t Год назад +1

    Super muper content :)

  • @michaelwatts1186
    @michaelwatts1186 Год назад

    Hey Derron, great walkthroughs. Question- in terms of the office macro that you created is there a easier way to go about it it seems like a lengthy setup and was curious if there was a pre created office macro template from a resource to work with and tailor if you come across this attack method scenario and want to go this route?
    Also if you come across the upload function that you play with the extension format in order to upload a reverse shell if certain extension are restricted instead of going the office macros route. Just curious why you didn't explore that further?
    Ideally I would prefer to avoid the office macro exploit to get an initial foothold just because its potentially adding additional aspects to your attack approach, and having to get into a spun up Windows instance to initiate, when there could be a better more efficient way? Just want to see your thoughts on it?

  • @TheSQL-Lover
    @TheSQL-Lover 5 месяцев назад +1

    Hi Derron. I am confused. You ran john with rules 1st, got no hit. Then you ran it again (after editing the video and a short pause) and you got a hit? what changed? The command was the same.

    • @derronc
      @derronc  4 месяца назад

      hmmmm, I'm honestly not sure. I may have screwed up the hash and cut that out of the video. it's likely something silly I had to cut out because of a mistake I made. Unless I commented on why it worked the second time I'd just treat it as though it should've worked the first time :)

    • @TheSQL-Lover
      @TheSQL-Lover 2 месяца назад

      @@derronc Hey, you are alive? lol ... how can I contact you? do you have a website ?

  • @spacington4022
    @spacington4022 3 месяца назад

    What’s the difference between a $ at the command line vs a % symbol

  • @1a4s4l7
    @1a4s4l7 Год назад +1

    Once you have a foothold on the ms01, is it necessary to use pivoting techniques?
    Suppose you can download tools on the compromised box, as an alternative, can you just live off the land?

    • @derronc
      @derronc  Год назад

      good question! I suppose you could try and live off the land and do everything from MS01, however it would definitely make things harder and may reduce your efficient use of time on the OSCP. I may take this on as a fun challenge though: see if you can do all of this without pivoting through MS01 😊

    • @eniak2300
      @eniak2300 7 месяцев назад

      Hey bro do you know why he didn't try to use impacket-GetUsersSPNs or impacket-GetNPUsers for kerberoasting and reproasating after obtaining the credentials of the first domain account?

  • @uaebikers
    @uaebikers 4 месяца назад

    When are you coming back to making videos? :D

  • @Laffinfpv
    @Laffinfpv Год назад

    I believe sekurlsa is supposed to be “secure LSA” 😊

  • @sandiproy9810
    @sandiproy9810 Год назад +1

    hey derron , can you please share on which year did you passed the oscp ? I'm asking because, in many groups some peoples complains about the dificulty level of oscp has been increased recently . what do you think about that ?

    • @derronc
      @derronc  Год назад +5

      I passed my OSCP back in Sept. of this year. I can't say I'm aware of what the previous versions of the exam difficulty were... but I can say that the OSCP exam for me was pretty difficult. I felt like I was going to fail until the last few hours when I managed to finally break through on the AD set. Once I did I pwned the AD set extremely quickly and that gave me enough points to pass. This is one of the reasons I decided to share my practice lessons on youtube: having the right process/comfort level can be the difference between passing/failing.

  • @sakyb7
    @sakyb7 7 месяцев назад

    How to did you set rules to crack that office hash?

  • @genelkanininaksine
    @genelkanininaksine 4 месяца назад +1

    Pls more videos

  • @b0161
    @b0161 5 месяцев назад

    Why can't nmap find port 445 of ms02 the first time, but can find it the second time? Can anyone help me solve this problem?

    • @derronc
      @derronc  4 месяца назад

      sadly, this was a unique problem to my lab environment and recording. I believe the packets were dropped the first time and they shouldn't have been. Ideally the recording would have shown the success from nmap both times, but I decided not to go back and re-record. more just showing the nuances of labs and tools, and it never hurts to re-run scans to confirm results

  • @EldaqiDedaqi
    @EldaqiDedaqi 3 месяца назад +1

    thank's

  • @hack4funacademy
    @hack4funacademy 10 месяцев назад

    hi when are u gonna give us a video about how to setting up this lab environment

    • @derronc
      @derronc  9 месяцев назад

      Thanks for the ping on this :) Life's been super busy with family/work/school but I'm hoping to have it posted this week.

    • @hack4funacademy
      @hack4funacademy 9 месяцев назад

      @@derronc I see, alright ty

  • @TheTacopai
    @TheTacopai 11 месяцев назад

    please more videos

  • @alihassam8748
    @alihassam8748 8 месяцев назад

    Anyone has Macro code?

  • @martindinchev5363
    @martindinchev5363 Год назад

    Great videos continue !!!