BRUTEFORCING DOMAIN PASSWORDS (AD #05)

Поделиться
HTML-код
  • Опубликовано: 1 фев 2025

Комментарии • 91

  • @_JohnHammond
    @_JohnHammond  2 года назад +6

    HUGE THANKS to Snyk for sponsoring this video & supporting the channel! Check out Snyk to help bake security into your development process, find and fix vulnerabilities before the bad actors do! snyk.co/johnhammond

    • @_JohnHammond
      @_JohnHammond  2 года назад +3

      @Not Convinced Of course! You need to know the adversary you are up against ;)

    • @passaronegro349
      @passaronegro349 2 года назад

      🇧🇷✨ here in Brazil we follow your channel.

    • @passaronegro349
      @passaronegro349 2 года назад

      @@_JohnHammond Brazilians can buy the courses ???

  • @TheHopeless72
    @TheHopeless72 2 года назад +3

    Hey John! I'm 22 and i've been learning coding, languages, hacking and all that sweet stuff since i was a kid.
    The way you explain things in your videos really helped me understand a lot more in a short period of time instead of just opening a terminal doing the ole trial and error OR watching videos where they don't explain anything at all, type in a lot of code at once and say "voila its done now you've learned".
    What i'm trying to say is thank you so much for helping me and other people learn all these cool stuff while having fun and experimenting, you're literally the best teacher one could have...
    Note: Apologies if i made any grammar mistakes, i'm Turkish

  • @j-makkk5208
    @j-makkk5208 2 года назад +56

    Hey John would you consider setting up some blue team tools and then after the series is over showing us how we could track our self's through the network and stuff like that

    • @_JohnHammond
      @_JohnHammond  2 года назад +45

      Yes ;)

    • @j-makkk5208
      @j-makkk5208 2 года назад

      Awesome can't wait

    • @frosecold
      @frosecold 2 года назад

      Hey, I want in!

    • @peacejon2019
      @peacejon2019 2 года назад

      Where's my Notepad?

    • @mds570
      @mds570 2 года назад

      Thats an amazing idea! Exactly what I want to learn! John please, kind sir! 😄

  • @d00b3rt
    @d00b3rt 2 года назад +5

    My favorite pentest tool! Would recommend adding a plug to account lockouts. Locking out a domain is never a good Monday

    • @ianm.2088
      @ianm.2088 2 года назад

      Absolutely! Enumerate the password policy of the network, or check with your contact for your IPT to make sure you don't lock out every user on the domain by password spraying.

  • @lumin0l161
    @lumin0l161 Год назад

    Absolutely top notch video and video series John. Thanks so much for making these, you've really taught me so much over the years :)

  • @UKvideos2009
    @UKvideos2009 2 года назад

    Man I had so much fun on this one, the setting up of the AD and such was fiddly but this made it worth it!

  • @rusirumunasinghe4129
    @rusirumunasinghe4129 2 года назад

    Loving this series so far and looking forward to the next video!

  • @Tirandus
    @Tirandus 2 года назад +9

    That was awesome and frightening at the same time. So much info from just a normal user account 😱

  • @pwerd
    @pwerd 2 года назад

    John, keep up the great work! These videos are a godsend.

  • @imranthoufeeque
    @imranthoufeeque 2 года назад +1

    Its super awesome but hope that this series will not gonna stop just like other ones 😅

  • @HopliteSecurity
    @HopliteSecurity 2 года назад

    This was fantastic. Please keep up the amazing work!

  • @georgemukiu8835
    @georgemukiu8835 2 года назад +1

    Interesting, this keeps me wondering on how to detect its usage on my network.

  • @TheH2OWeb
    @TheH2OWeb 2 года назад

    Great video as always John ! Thank you !!!

  • @Sabyas_Hub
    @Sabyas_Hub 2 года назад +5

    John makes Hacking noob friendly.

  • @thepioneer517
    @thepioneer517 2 года назад

    cool great series to learn how to come from Zero to Hero ... please never ends ;-)

  • @efiita7554
    @efiita7554 2 года назад

    thanks john! great content as always...

  • @cocosloan3748
    @cocosloan3748 2 года назад

    Amazing as always

  • @baconlover1158
    @baconlover1158 2 года назад

    one of the best and maybe you are the best

  • @astech.4u
    @astech.4u 2 года назад

    Love from India ❣️

  • @hamedranaee5641
    @hamedranaee5641 2 года назад

    You are the real one 💪

  • @AngelMetzTutoriales
    @AngelMetzTutoriales 2 года назад +1

    At minute 18:00 you did not get information from the ports and SMB in ws01 machine because possibly the windows 11 firewall was blocking you

  • @amiramiry6910
    @amiramiry6910 2 года назад +2

    Sheeesh this is interesting

  • @markfuentes3666
    @markfuentes3666 2 года назад

    Love it

  • @scott8964
    @scott8964 2 года назад

    Could you please do a video step by step showing us how to set up linux on a Windows computer so it is easy to use follow as in 100%anonymous for us to use to start learning Linux ie chinging or IP address if possible love these videos please don't stop making them

  • @netanel135
    @netanel135 2 года назад

    You are awesome

  • @ricseeds4835
    @ricseeds4835 2 года назад

    Great stuff as always but did I miss the part where you find the DC IP address as someone who didn't set up the lab?

    • @lordmummie
      @lordmummie 2 года назад +1

      You could find the DC by using nmap and looking at the open ports

  • @rabidmoose01
    @rabidmoose01 2 года назад +1

    Not sure if this was pointed out, but if you iterate through each line in users.txt, you can run crackmapexec on each iteration without the continue on success flag and pipe that output through grep.
    eg while read user; do cme stuff -u $user -p passwords.txt | grep '[+]'; done < users.txt

  • @Raza_9798
    @Raza_9798 2 года назад +2

    Hey all. I'm here from sri lanka

  • @liradavid1
    @liradavid1 2 года назад

    That wasn't a long video. But a great video.

  • @vhje9754
    @vhje9754 2 года назад +2

    hello from the netherlands

  • @jasonirvin6782
    @jasonirvin6782 2 года назад

    I cant like anymore because its perfectly balanced at 666! Very Nice !

  • @PhrostyGaming
    @PhrostyGaming 2 года назад +1

    How does this prevent the "lockout after 3 attempts" policy?

  • @prikshatkeinth
    @prikshatkeinth 2 года назад

    thx work

  • @larrymoose15
    @larrymoose15 2 года назад +1

    I didn't understand why there was no limit on login attempts. Wouldn't that be a problem in real cases?

    • @anthonybyrne2262
      @anthonybyrne2262 2 года назад

      I downloaded the latest Win2022 server iso today and installed it and I was wondering the same thing.
      It seems that by default, group policy sets the account lockout mechanism to "Not configured". If you want to rate limit the sysadmin will need to change the group policy.

  • @monstroPT
    @monstroPT 2 года назад

    @john could you share what's the hardware on which you're spawning all the VMs?
    The behemoth that you mentioned a couple of videos back.

  • @snwtoy
    @snwtoy 2 года назад

    Appreciate the content, but what kind of a n00b configures a domain with no lockout policy for x password fails in y minutes? It's interesting to see the tool, but in reality you could do all the the exact same things with a few lines of powershell, even from a *nix machine.

  • @stswebhusesele5626
    @stswebhusesele5626 2 года назад

    As MCSA expired, which certificate would you recommend that has the same content as MCSA?

  • @Semtx552
    @Semtx552 2 года назад

    My appetite has been wetted, thanks!
    i will replay this attack in my lab env, but with "Defender for Identitiy" active. see how it is detected.

    • @dandk_
      @dandk_ 2 года назад +1

      whetted ;p

  • @kenGPT
    @kenGPT 2 года назад

    21:16 9 lines from the bottom 😉

  • @sandra8139
    @sandra8139 2 года назад

    so you can see the malware lookout security app is

  • @YEAHPLAYGAE
    @YEAHPLAYGAE 2 года назад +2

    Can you show us your terminator config?

    • @MiguelDevOps
      @MiguelDevOps 2 года назад

      He has a video talking about his config in terminator

  • @ArSiddharth
    @ArSiddharth 2 года назад

    Hello from India

  • @utensilapparatus8692
    @utensilapparatus8692 2 года назад

    🖇 John the Ripper!

  • @like_a_boss8262
    @like_a_boss8262 2 года назад

    You love to see it

  • @NicholasMarkovich
    @NicholasMarkovich 2 года назад

    Is it just me or is the audio slightly ahead of the video in this?

  • @suryaroja03
    @suryaroja03 2 года назад

    Thankyou

  • @rayxfinkle8328
    @rayxfinkle8328 2 года назад

    I'm curious if once it establishes what the password policy is, if it only tries words in the password list that fit the password policy. Or if it still checks every password whether or not it complies.

  • @notta3d
    @notta3d 2 года назад +1

    Is this actually trying the user name and password combos? if so wouldn't this lock out the account? Also, do the AD controllers log these attempts?

    • @lmaoroflcopter
      @lmaoroflcopter 2 года назад +1

      Yes. Yes - but if you were spraying, you'd usually configure it to stay under the lockout threshold limit for an account.
      Event 4625.
      However, if you just straight up monitor this on any reasonably sized network, you'll be absolutely smashed with people derping their creds legitimately.
      Try instead monitoring for attempts for x different accounts from a single host. It might be normal to see 4624 events (services use user accounts) and maybe the odd misconfiguration resulting in 1 or 2 4625's regularly across the IT estate, but its unlikely to be normal to see say 4 different 4625's from a single host.
      That way you'll identify an actual spray, eliminating the noise and someone using cme on your network should in theory light up like a Christmas tree.
      *this obviously is only one method of spraying. Kerbrute, etc may result in different event IDs (e.g. 4771)

  • @pppp9459
    @pppp9459 2 года назад

    I would love to understand and follow you but i couldn't. It went to fast for me unfortunately

  • @cryptosimsihc
    @cryptosimsihc 2 года назад

    master what is your eye icon on your top of your phone? on your other episode video. i watching your content when im stress. your video is stress relief sometimes for me. i home you can do episode that what best application that we can use to prevent for hackers or virus. I'm using vpn and anti virus what is you think? thankyou and advance i hope you can help us to protect our personal life. thankyou so much. :)

  • @francescofrullano
    @francescofrullano 2 года назад

    why you don´t use wsl you can launch instaces of kali from windows start menu

  • @Exodiiac
    @Exodiiac 2 года назад +1

    Hey john it looks cool but not very practical. Usually after 5 failed attempts the account gets locked out. Spamming password till you hit something will just lock users out of their systems

    • @anthonybyrne2262
      @anthonybyrne2262 2 года назад +2

      It seems that by default, group policy sets the account lockout mechanism to "Not configured". A sysadmin will need to change the group policy manually to set a rate limit so you might find yourself lucky. Alternatively, you could try password spraying accross all users instead of 1. I.E. instead of try 5000 passwords on 1 account, try the 4 most common passwords accross 5000 account (assuming your client organisation is a large enough entity). If they are a small enterprise youre really just more likely that the default is set!

  • @LinuxJedi
    @LinuxJedi 2 года назад

    that shit never worked on virtualbox in windows i tried like 12 times at least and then i would try to boot to the OS but the grub menu never popped up and it never booted to the login screen

  • @sandra8139
    @sandra8139 2 года назад

    I find that the cyber security app is working better than the try to hack site it is like Ben made it of me and I am the real Sandra Mulligan of Australia

  • @finthefail9599
    @finthefail9599 2 года назад

    let's hack the youtube algorithm

  • @Xbotto
    @Xbotto 2 года назад

    its porketta btw, not porscietta

  • @bhagyalakshmi1053
    @bhagyalakshmi1053 Год назад

    Password files is colors red

  • @guilherme5094
    @guilherme5094 2 года назад

    👍

  • @sandra8139
    @sandra8139 2 года назад

    I unsubscribed and don't even use lookout security I been in RUclips the whole time

  • @maelteprah123
    @maelteprah123 2 года назад

  • @entertainment6030
    @entertainment6030 2 года назад

    Add Arabic translation

  • @hassanaziz171
    @hassanaziz171 2 года назад

    Donnelle Raeburn they have a free trial version

  • @MantisSTS
    @MantisSTS 2 года назад

    Regarding the OSINT (LinkedIn stuff) I do have a script that uses Selenium to scrape the LinkedIn users and generate an email list if anyone is interested.

  • @ngongasionasiona6584
    @ngongasionasiona6584 Год назад +1

    Hey John would you consider setting up some blue team tools and then after the series is over showing us how we could track our self's through the network and stuff like that

  • @ngongasionasiona6584
    @ngongasionasiona6584 6 месяцев назад

    Hey John would you consider setting up some blue team tools and then after the series is over showing us how we could track our self's through the network and stuff like that