Active Directory Enumeration With PowerView

Поделиться
HTML-код
  • Опубликовано: 21 янв 2025

Комментарии • 53

  • @mutwakilsuliman3867
    @mutwakilsuliman3867 3 года назад +10

    Just in time im preparing for the OSCP and i gain so much information from ur videos .. thanks alot

  • @cy_wareye7395
    @cy_wareye7395 2 года назад +1

    Thank You. You always keep me up-to-date with "know-how" things. When i got few sources to study with same content and one of them Your tutorial - I choose Your's coz it clean and easy to understand.

  • @agents_of_hydra1859
    @agents_of_hydra1859 3 года назад +2

    Your explanation style is awesome

  • @rudrasalaria3431
    @rudrasalaria3431 3 года назад +1

    Thank you for this kind of video. Your videos are always amazing. I learn a lot from your video.

  • @djmeezymeez940
    @djmeezymeez940 3 года назад +4

    Keep them coming my guy 🔥🔥🔥

  • @морс-ф3д
    @морс-ф3д 3 года назад +1

    BIG THANK YOU for YOUR INTENSIVE WORK FOR US!!!!!

  • @yamunaudayanthi3266
    @yamunaudayanthi3266 3 года назад +2

    Amazing video....❤️🤩 Thank you so much....😍😘

  • @cyvorsec
    @cyvorsec Год назад +1

    TY for great videos! 😃

  • @MaxDzdz
    @MaxDzdz 3 года назад +1

    Tnks for all video !! ❤️

  • @agents_of_hydra1859
    @agents_of_hydra1859 3 года назад +1

    Very interesting video bro

  • @sathishganapathy802
    @sathishganapathy802 2 года назад +2

    Hi HackerSploit, thanks for the tutorial. It's very helpful.
    How to identify the version of PowerView in use? Because, some of the commands in the cheatsheet such as 'Get-DomainUser' is not working in this version in THM.

  • @abdelghfarahmed
    @abdelghfarahmed 9 месяцев назад

    You are an angel

  • @mub1n
    @mub1n 2 года назад

    plz keep doing these videos

  • @alexeysolovyev1107
    @alexeysolovyev1107 3 года назад

    Love you videos buddy

  • @init_6415
    @init_6415 3 года назад +1

    WOW, U r teaching at us 4:38 AM, is it kali time error or ... .

  • @accrevoke
    @accrevoke 3 года назад

    I think the regular windows defender would block the script, and basically any antivirus product. I wish THM would add the basics on disabling EDR / antivirus and applockers rule in their challenge, or demo some of the common in-memory iex techniques

    • @HackerSploit
      @HackerSploit  3 года назад

      We will cover AD evasion as we progress.

  • @jerryasagba7352
    @jerryasagba7352 3 года назад

    Please Someone answer this
    Is shell scripting the same as bash scripting or if I learn shell scripting do I have to learn bash scripting like it’s a new language or they are the same

    • @damonlee7055
      @damonlee7055 3 года назад +1

      Shell scripting is a broad term that bash scripting falls under. Bash is just 1 shell among many other shells like ksh, zsh. Each shell will have its own peculiarities but most should support original sh commands / syntax. So to answer your last question, it's mostly like learning 1 language.

    • @jerryasagba7352
      @jerryasagba7352 3 года назад

      @@damonlee7055 Thank You So Much

  • @aziz5901
    @aziz5901 3 года назад

    I have one question sir, hope you answer this .. im sorry if it can be silly you say active directory network what do you mean by that ?

    • @8080VB
      @8080VB 3 года назад

      Its a domain who is developed by ms , which is only found in winserver systems , where in an enterprise many computer connected into a single domain , so they can communicate each other n do stuff remotely , also admins can create group policy and manage permissions. Eg for a college or an big enterprises most likely have an Active directory.

    • @jakobro1794
      @jakobro1794 3 года назад

      A computer registered in a Domain. Some computers have a local account, if it's not local it's AD. With AD theirs others PAssword policies, etc.

    • @aziz5901
      @aziz5901 3 года назад

      @@8080VB I understand that but what I mean is when he used AD network words . I was thinking is there any networking technology in AD apart from literal networking we do to connect devices ?

    • @8080VB
      @8080VB 3 года назад

      @@aziz5901 whats your goal?

  • @Marc-td7nn
    @Marc-td7nn 3 года назад

    Great job. Can u post a document of the commands? Thanks

    • @HackerSploit
      @HackerSploit  3 года назад

      Working on a GitHub repo that will highlight all the commands used.

  • @PandaandSparrow
    @PandaandSparrow 3 года назад

    Nice Video

  • @sabyasachisahoo8975
    @sabyasachisahoo8975 3 года назад

    keep posting about acitve directory

  • @marcellogambetti9458
    @marcellogambetti9458 2 года назад

    very good video, BUT as caveat remember most of those commands REQUIRE to be ALREADY administrator...

  • @dyes8082
    @dyes8082 3 года назад

    Great video, im really enjoying this series and it couldnt of happened at a better time. I'm currently studying for my CRTP exam - 1st chapter of the study material provided covers powerview. In the test lab environment I have normal user privileges and i cant run powerview as windows defender blocks it for being malicious content. Do you have any tips or references on how to gain rights to run such scripts like powerview? I did set the execution policy to bypass, this gets access denied to registry key but can be bypassed by doing what you displayed in the video - running it from cmd(thanks!).

    • @HackerSploit
      @HackerSploit  3 года назад +2

      We will cover IDS and AV evasion.

    • @socat9311
      @socat9311 3 года назад

      There are AMSI bypass strings if you look it up. I believe CRTP labs material cover it

    • @dyes8082
      @dyes8082 3 года назад

      @@socat9311 Yep, it is covered - i felt the content for the crtp was a bit all over the place but in saying that i was able to pass the crtp first try

    • @sathishganapathy802
      @sathishganapathy802 2 года назад

      It's covered in the lab manual how to use invisi shell and bypass AMSI

  • @shivasijwali6779
    @shivasijwali6779 3 года назад

    Please make video on bufferoverflow pls?

  • @rkvideos4091
    @rkvideos4091 3 года назад

    Nice

  • @shauncremen7378
    @shauncremen7378 3 года назад +1

    What's the point of power view if it will more than likely be blocked by windows firewall immediately

    • @HackerSploit
      @HackerSploit  3 года назад +2

      This video highlights the enumeration process. We will cover AD and IDS evasion as we progress.

    • @ppetrix
      @ppetrix 3 года назад

      Ok ok . But all of this is not cough by AV? or for this what we have to do to mitigate ? Tnx

    • @shauncremen7378
      @shauncremen7378 3 года назад

      @@HackerSploit awesome can't wait!

    • @shauncremen7378
      @shauncremen7378 3 года назад

      ​@ppetrix caught by AV immediately. To mitigate it you need to use bypassing AV techniques or turn of the firewall off.

  • @wildaceds
    @wildaceds 3 года назад +2

    a little comment for the algo

  • @__sidharth__
    @__sidharth__ 3 года назад

    👍👍👍

  • @Viren09official
    @Viren09official 3 года назад

    superd

  • @VoteOne-vw4eb
    @VoteOne-vw4eb Год назад

    AND IT'S FREE🥺

  • @netbin
    @netbin 3 года назад

    while hackersploit giving a salute to guys, ippsec already made nmap scan and have changed the hosts file.

    • @8080VB
      @8080VB 3 года назад

      Wym?