Heath, thank you for sticking through the tough times to continue leading this industry by example. You know this but you make a huge impact on thousands of lives. You have a wonderful team too.
Thanks for everything you do for the community. Can't wait to finish the PEH course, been sidetracked by other commitments, but this helps motivate me to get back into it.
Hey! New fan here.... Just wanted to drop a line expressing my gratitude for your hard work in keeping us all on top of our games. Thank you! Thank you...... May The Lord keep blessing you and your family! 🙏
A little tip for setting up windows 10 machines (for workstation only): Once you are done with the first one, right click on the windows 10 tab then: VM -> Manage -> Clone. Make sure that you do this before setting up users, and domain settings. Happy hacking! o7
These are the best vids with the best voice that doesn't put u to sleep the cmd hashcat blew my mind didn't no cmd was so handy still thank you for the vid
Great stuff. I am learning a lot. 2:16:47 SMB Relay. Do you have to trick the one machine user to go to a share on your machine? Is this just using a broadcast capture similar to LLMNR you showed earlier?
You don’t have to trick the user. In the video he pointed to his own machine IP but in general if a user mistypes while connecting to a different share, it’ll capture and point it to attackers machine
@@kaiadkins Might be. But trust me it’s way more common. What we basically do is. We run a tmux session and there we start responder and leave it. Sometimes it takes a lot of time. But sometimes it doesn’t take more than a day
The only bad thing about PNPT and the others certs here is the financial side. The price is super affordable but still got no payment plan or financial arrangement whatsoever. Not everyone has the money ready to go. But a short monthly plan. 3 to 6 months would bring me in
Hey one tip from me is . i am currently running on 8 gb of total system ram with i3 5005 cpu. its really old but the way i set up is i installed backbox and as it is ubuntu with hacking tools i just do a distro upgrade and then now i have given 1.5gib to 2 windows respectivels and 2 gib to windows server having a ubuntu with hacking tools . NOT ALL TOOLS BUT it will be fine for low end users>>. one more thing is download a 32 bit of windows 10 as they are low>
You have so much important content, it is discouraging for an absolute beginner because they do not know where to start and how to measure their progress and most important how they can match their current progress with real life demands in the security industry. I am sure it will take a full video just to help put followers on a study/progress path, overall your videos are ablolute bangers 100% tumbs up
Hi TCM , currently I'm doing PEH , but I have one doubt from where I need to start to get into cloud security. Like product based or multi cloud . Can u give me a suggestion
I just tried to run responder with the flag “-rdwv” but it gives the error “no such option: -r” I checked the help page and apparently the -r option doesn’t exist anymore?
Great video! From a Pentester perspective, what are the requirements to ask to a client in order to do an effective Active Directory pentest? Thank you
I am having difficulties in getting the Firefox esr to run on my kali 32bit on virtual box . Wonder if you happen to encounter the same from other people
Hello Heath, Thank you for this video. Question, what is the difference between joining in your Attack AD Defend from PEH training? I can see almost the same topics?
A good chunk of the material can be found in the AD sections of the Practical Ethical Hacking course, which is part of our Academy. There are a few topics we'll be covering that aren't covered there, but the big benefit of the live class would be for those that prefer to learn in a classroom setting, would prefer not setting up their own labs, prefer direct instructor interaction, etc. So it just depends on your learning style.
@@TCMSecurityAcademy Thank you Heath, I love what you do for the community and helping me in my career. Almost taking all your training in TCM academy. Hoping for more training in the future. More power to you and your team!
For some reason I get an error when trying to join the workstations to the domain "That domain could not be found" I followed the video exactly. I also ensured on the server that DNS was running and could be reached. Any thoughts?
I had the same issue, turns out for all machines Windows Defender has to be manually disabled and IPv6 turned off in Network properties. I found YT video that actually helped me after 8 hours of trying to solve this -> Made by Kindson The Tech Pro "How to Setup Active Directory Domain With VirtualBox and Join Computers - 2020". I hope that helps!
Hi Heath, Thanks for This video, i have a installed windows 10 and made it as Marvel/thePunisher and also have windows 7 installed in my vmware wondering if i can make my windows 7 machine to join as a Spiderman 2nd machine or do i have to make a windows 10 clone in order for everything to be working smoothly.
Hi there, i am curiouse how you are running the Oracle VirtualBox on M1 MacBook, is it already available in a live stable version. Last time i tryed to manage VMs with VBox it was in beta version and not really usable.
When will You make malware development course so we can be as real as possible when it comes to testing real enviroment? Meterpreter is triggering AV and in real scenario You wouldn't get shell with simple meterpreter payload if AV was running. We (at least I 🙂) want to learn the part where we are crypting our payload but we can't do that without specific pre-knowledge, and we don't know how to get there. I hope You will at least read my comment.
@@ienabellamy Thank you for your answer. Then I have to check what I'm doing wrong. Somehow my mitm6 script doesn't spoof any request. So literally nothing happens.
hi, my ipv6 attack is not working it says connection reset by peer. and is the authentication of the punisher was done because we provided the credentials or it captured the credentials and did the authentication in the ipv6 attack.?
@@avichiii I think the problem was due to the sudden closing of vm . I have 16 gb of ram and i was running 4 vm kali 4gb, windows server 2gb and 2 windows 10 with 2gb each and windows as the base operating system. I think due to lack of ram not all 4 stays one suddenly shuts down after some time. SO, that was interrupting I think. But if you have something I'd be happy to listen, problems arise everytime so, your solution may be helpful next time. Thank You.
Heath, thank you for sticking through the tough times to continue leading this industry by example. You know this but you make a huge impact on thousands of lives. You have a wonderful team too.
For anyone stuck at 1:23:50, Windows Defender Antivirus has been renamed Microsoft Defender Antivirus in Server 2022.
nice one
lol i was confused for a second, then i realised i'm still using server 2019
Thanks alot, it save my time
Thanks for everything you do for the community. Can't wait to finish the PEH course, been sidetracked by other commitments, but this helps motivate me to get back into it.
Hey!
New fan here....
Just wanted to drop a line expressing my gratitude for your hard work in keeping us all on top of our games.
Thank you!
Thank you......
May The Lord keep blessing you and your family! 🙏
finally finished the course, learned a lot.
Thank you sifu 🙏 This is exactly what I'm getting into at the moment. Synchronicity or what 🤯
On a serious note, thanks for sharing and thanks for everything you do for the community 🎉🎉
I’m joining the courses then moving to get started with certs thank you for all the work you put into this
A little tip for setting up windows 10 machines (for workstation only): Once you are done with the first one, right click on the windows 10 tab then: VM -> Manage -> Clone. Make sure that you do this before setting up users, and domain settings. Happy hacking! o7
These are the best vids with the best voice that doesn't put u to sleep the cmd hashcat blew my mind didn't no cmd was so handy still thank you for the vid
TCM you're the best! You forever have my respect. And thank you for your service, Heath!
shared with my co-workers (work for a managed security company). one of my co-workers with working towards PJPT, so this will be helpful
As always the greatest content ever
My advise to students
Love and cherish every second of this lecture it some ones life's work
Thank you for the awesome pentest series.
Great stuff. I am learning a lot. 2:16:47 SMB Relay. Do you have to trick the one machine user to go to a share on your machine? Is this just using a broadcast capture similar to LLMNR you showed earlier?
Same question here, did you get it solved?
I did not manage to reproduce what he did, is it the same for you ?
You don’t have to trick the user. In the video he pointed to his own machine IP but in general if a user mistypes while connecting to a different share, it’ll capture and point it to attackers machine
@@the_sandman00there’s got to be some other methods I feel like the chances of a user pointing to an incorrect UNC path is slim to none
@@kaiadkins Might be. But trust me it’s way more common. What we basically do is. We run a tmux session and there we start responder and leave it. Sometimes it takes a lot of time. But sometimes it doesn’t take more than a day
Thanks for making this course available! I’ll definitely check out your courses in the website.
15 mins in and already amazing
Amazing video, I learned a lot. Thanks!
TCM you are awesome a gift to rising pentesters............. GODSPEED..
Amazing course for sure!!
The only bad thing about PNPT and the others certs here is the financial side. The price is super affordable but still got no payment plan or financial arrangement whatsoever. Not everyone has the money ready to go. But a short monthly plan. 3 to 6 months would bring me in
Thank u for share this, i have no money sign up at tcm, so i enjoy watch on youtube
Hey one tip from me is . i am currently running on 8 gb of total system ram with i3 5005 cpu. its really old but the way i set up is i installed backbox and as it is ubuntu with hacking tools i just do a distro upgrade and then now i have given 1.5gib to 2 windows respectivels and 2 gib to windows server having a ubuntu with hacking tools . NOT ALL TOOLS BUT it will be fine for low end users>>. one more thing is download a 32 bit of windows 10 as they are low>
Working out Heath? Looking fitter! Hahaha Thanks for the great content as always!
Thank you ❤❤❤❤
Last video before bed 😊
just made a active directory lab in virtualbox too
2:13:16 Do I have to disable the firewall in my "Punisher" windows so I can get the nmap results (It is showing filtered ports) ?
thanks tcm for this valuable free content
Thank you for this great video.
Wow amazing thank you
You have so much important content, it is discouraging for an absolute beginner because they do not know where to start and how to measure their progress and most important how they can match their current progress with real life demands in the security industry. I am sure it will take a full video just to help put followers on a study/progress path, overall your videos are ablolute bangers 100% tumbs up
Thanx so much for publishing this material. I would love to connect.
Thank You! This helps a lot with getting data! 😊
I am just waiting for this tutorials Thanks a lot...
Hi TCM , currently I'm doing PEH , but I have one doubt from where I need to start to get into cloud security. Like product based or multi cloud . Can u give me a suggestion
Thank you for your kind share
Thanks amazing course
Thanks you sir, much appreciated.
thank you
Thank you so much TCM Sec.
Muchas gracias!
Thanks Dear
Good review for the PJPT!
Thanks for this great course please make one advance active DIRECTORY hacking ❤❤❤❤
I just tried to run responder with the flag “-rdwv” but it gives the error “no such option: -r”
I checked the help page and apparently the -r option doesn’t exist anymore?
yes -r is not used in the updated versions, you need to exclude r, just go with -dwv
Great video! From a Pentester perspective, what are the requirements to ask to a client in order to do an effective Active Directory pentest? Thank you
Heath Adams aka the beyonder
My ntlmrelayx doesn't work. Do u know if the problem is about my version of python (3.11) ?
Does the new course cover azure ?
2:42:39 would it be the same if we use ip address for a normal user, or should we use the domain controller ip?
I love it 🥰
Большое спасибо !
I am having difficulties in getting the Firefox esr to run on my kali 32bit on virtual box . Wonder if you happen to encounter the same from other people
Can i Follow trough the course if I go with windows 11 Enterprise
Does anyone know if this video helps getting passed the wall you hit in the pjpt?
i cant see the computers in my network tab why is that even after enabling network sharing
Unbelieveable ❤️
New virtual machine and open new window in file menu is disabled in vmware workstation 17, any suggestions,?
thank you 👍👋👋
Hello Heath, Thank you for this video. Question, what is the difference between joining in your Attack AD Defend from PEH training? I can see almost the same topics?
A good chunk of the material can be found in the AD sections of the Practical Ethical Hacking course, which is part of our Academy.
There are a few topics we'll be covering that aren't covered there, but the big benefit of the live class would be for those that prefer to learn in a classroom setting, would prefer not setting up their own labs, prefer direct instructor interaction, etc. So it just depends on your learning style.
@@TCMSecurityAcademy Thank you Heath, I love what you do for the community and helping me in my career. Almost taking all your training in TCM academy. Hoping for more training in the future. More power to you and your team!
@@TCMSecurityAcademysir I would like to know how to have access to your academy for paid course if there are any
getting error when downloading PMK darklab is allegedly infected.. researched and they are supposed to be updating to remove it
hey i cant download workstation. it shows me error over and over again.
Big fan
welp, I had nothing better to do this weekend
windows hacking world is big, like the cloud stuff
Awesome! Thank youuuuu
Windows server&Enterprise on ARM?
1:25:00
Hi it seems that I have some difficulties in running Virtual Box on MacBook for 64 bits just wonder if anyone has encountered the same situation
Hi. I couldn't join the Domain of one vm to the local administrator. Can anyone help or guide me?
I have the same issue, trying to research that. If I find anything I will let you know.
For some reason I get an error when trying to join the workstations to the domain "That domain could not be found" I followed the video exactly. I also ensured on the server that DNS was running and could be reached. Any thoughts?
having the same issue here. I also noticed that my ipv4 address is the same for all 3 of my machines....
@@Eric-ey7rm if you use virtualbox change the NAT to the NATnetwork,your ip's will be different(I wrote it because,if anybody will face this problem)
I had the same issue, turns out for all machines Windows Defender has to be manually disabled and IPv6 turned off in Network properties. I found YT video that actually helped me after 8 hours of trying to solve this -> Made by Kindson The Tech Pro "How to Setup Active Directory Domain With VirtualBox and Join Computers - 2020". I hope that helps!
1:49:04 why the hashes are different?
wondering about the same thing, did you find out why?
@@somebody3014not yet actually
This came in at the right time
yes sir
does anyone have problem like mine, error while powering on: this host does not support intel vt-x. what should i do?
I guess turn on hypervisor...did you try BIOS..
Could I detonate ransomware on this lab?
4:07:35
thank you is verry cool
hey i have a question. what if your vm machine runs slow? is there an alterntive? also kali linux is false postive for me
What brand of glasses do you wear?
Hi Heath, Thanks for This video, i have a installed windows 10 and made it as Marvel/thePunisher and also have windows 7 installed in my vmware wondering if i can make my windows 7 machine to join as a Spiderman 2nd machine or do i have to make a windows 10 clone in order for everything to be working smoothly.
Is there any student discount on All access membership?
At 02:44:00 when I run ntlmrelayx I get the error saying Errorno 104 connection reset by peer can someone help me resolve it pls
were you able to sort the issue? I have a similar problem
@@UserMS101 yes I was able to sort it
@@josephalan31how?
Woow dude!
Hi there, i am curiouse how you are running the Oracle VirtualBox on M1 MacBook, is it already available in a live stable version. Last time i tryed to manage VMs with VBox it was in beta version and not really usable.
When will You make malware development course so we can be as real as possible when it comes to testing real enviroment? Meterpreter is triggering AV and in real scenario You wouldn't get shell with simple meterpreter payload if AV was running. We (at least I 🙂) want to learn the part where we are crypting our payload but we can't do that without specific pre-knowledge, and we don't know how to get there. I hope You will at least read my comment.
Awesome course. Thanks!!
Someone here tried the MITM6 attack using Windows Server 2022 and workstation Windows 11?
yes, it works. I tried win server 2019 and 2022 with windows 11 arm machines, worked flawlessy.
@@ienabellamy Thank you for your answer. Then I have to check what I'm doing wrong. Somehow my mitm6 script doesn't spoof any request. So literally nothing happens.
I see that the current version of VirtualBox does not support Mac OS. Any alternatives?
vmware workstation player
First? 😅
hi, my ipv6 attack is not working it says connection reset by peer. and is the authentication of the punisher was done because we provided the credentials or it captured the credentials and did the authentication in the ipv6 attack.?
is your problem solved, if not i can help!
@@avichiii I think the problem was due to the sudden closing of vm . I have 16 gb of ram and i was running 4 vm kali 4gb, windows server 2gb and 2 windows 10 with 2gb each and windows as the base operating system. I think due to lack of ram not all 4 stays one suddenly shuts down after some time. SO, that was interrupting I think.
But if you have something I'd be happy to listen, problems arise everytime so, your solution may be helpful next time. Thank You.
@@avichiii I think I need your help. Can you help me out? Its really not working the ipv6 attack.
@@johnbeal6592 ya sure, tell me!
Did you manage to solve this ? I'm encountering the same problem.
Hi bdg hack banao
God the first hour and half is messy and little bit rush.
All this hash and crack really paints a bad picture of the CySec Community -.-
Mindnumbingly dull. Still informative. Thanks.
Please subtitle
1:38:20