Hacking Domain Admin 6 ways to Sunday | PetitPotam, DCSync & Golden Tickets

Поделиться
HTML-код
  • Опубликовано: 1 фев 2025

Комментарии • 16

  • @EdwardAmarh-01
    @EdwardAmarh-01 3 года назад +5

    Great walkthrough.

  • @i-am-le-vamp
    @i-am-le-vamp 3 года назад +1

    I can't stand MGK but love the video dude! Very cool!

    • @CyberlinxSecurity
      @CyberlinxSecurity  3 года назад +3

      😂😂 thanks so much! We can't judge Russell's music taste but at least the tech is good 😉

  • @TruthSeeker7101
    @TruthSeeker7101 2 года назад +1

    Thank you so much for the Video do you have the text transcript of the video?

  • @cvport8155
    @cvport8155 Год назад

    Please make more vd for advanced techniques red team and make server Discord good work

  • @novianindy887
    @novianindy887 2 года назад +2

    does it still work nowadays?

  • @3rdtwirl494
    @3rdtwirl494 8 месяцев назад

    Once you have domain
    Admin can the user know who you are ?

  • @testzeroday5493
    @testzeroday5493 3 года назад +1

    Can you tell how to set up domain controller?

    • @CyberlinxSecurity
      @CyberlinxSecurity  3 года назад

      This is a brilliant resource to setup an Active Directory lab.
      ruclips.net/video/xftEuVQ7kY0/видео.html

  • @bughunter9766
    @bughunter9766 3 года назад

    Thanks Bro,, Do we need to upload mimikatz to the victim PC win10 ? or its running on kali as windowsVM .

  • @ronpetrillo9103
    @ronpetrillo9103 2 года назад

    Should it be very high priority for NTLM to be disabled or is patching enough to prevent any exploit?

  • @alejandroparrello6493
    @alejandroparrello6493 2 года назад

    Hi! good video! i have a question, if i disable llmnr in all domian PCs, netbios, signing req allways, response only ntlmv2, shared folders off (all PCs), disable cmd, powershell to users, rdp off, win updates cuarenta, AV and ids/ips utm on all cross vlans. It's posible to do this pentest? thanks!! regards

    • @modsmilzo644
      @modsmilzo644 2 года назад

      Probably DC dont have all patches , and u can execute zerologon ! :) and exploit that ! Also you can search for missconfiguration in Service Accounts , and try password spraying, bruteforce , etc . Dump ldap with bloodhunt to have more details about the DC.

  • @modsmilzo644
    @modsmilzo644 2 года назад

    Dude , can i know which is the CA server ? because i can enum the DC-AD , but i never know there is a CA server :/

  • @twisfxf
    @twisfxf Год назад

    You domain admin????

  • @twisfxf
    @twisfxf Год назад

    Are you domain hacker