What is Active Directory? (Active Directory Pentest) Cheatsheet - OSCP PNPT CPTS With InfoSec Pat

Поделиться
HTML-код
  • Опубликовано: 11 сен 2024

Комментарии • 20

  • @muhammadusman2131
    @muhammadusman2131 28 дней назад +1

    Brother, I love your work and what you do. Keep doing what you do and let's build this community together. Love from Pakistan. :)

    • @InfoSecPat
      @InfoSecPat  28 дней назад +1

      Thank you so much and I’m always trying my best and sharing my experience

  • @ShaunDan
    @ShaunDan 28 дней назад +1

    This is Awesome ☺✌👍❤Looking forward to the other videos...

    • @InfoSecPat
      @InfoSecPat  28 дней назад +2

      Thank you so much 😁

  • @Redforeman1970
    @Redforeman1970 28 дней назад +1

    This is very cool. Can’t wait to see it.

  • @hurmzyaroo8742
    @hurmzyaroo8742 28 дней назад +1

    Hi Patrick,
    Let me know when you publish your course

  • @anemic66
    @anemic66 28 дней назад +1

    Great info!

  • @tennesseetuned
    @tennesseetuned 24 дня назад +1

    I start PNPT tomorrow.

    • @InfoSecPat
      @InfoSecPat  23 дня назад +1

      Awesome and good luck 👍

  • @hiddengo3232
    @hiddengo3232 27 дней назад

    how to use responder from outside of the network

  • @jacekwach5958
    @jacekwach5958 28 дней назад +1

    When will the course be available?

  • @neotokyo98
    @neotokyo98 28 дней назад +1

    when can we expect the course to be out

  • @hmoodzking1647
    @hmoodzking1647 28 дней назад +1

    i have a question
    so if i have a shell on the external that i can use to pivot to the internal with no creds of a domain user
    should i start with these attackt? i.e: crackmapexec, kerbrute, GetusersSPN, etc?

    • @InfoSecPat
      @InfoSecPat  28 дней назад +1

      You want to get more creds and hashes. Start with responder.

  • @Bla_ck_LA_Goon
    @Bla_ck_LA_Goon 28 дней назад +1

    thank you ❤