Thank You. You always keep me up-to-date with "know-how" things. When i got few sources to study with same content and one of them Your tutorial - I choose Your's coz it clean and easy to understand.
Hi HackerSploit, thanks for the tutorial. It's very helpful. How to identify the version of PowerView in use? Because, some of the commands in the cheatsheet such as 'Get-DomainUser' is not working in this version in THM.
I think the regular windows defender would block the script, and basically any antivirus product. I wish THM would add the basics on disabling EDR / antivirus and applockers rule in their challenge, or demo some of the common in-memory iex techniques
Please Someone answer this Is shell scripting the same as bash scripting or if I learn shell scripting do I have to learn bash scripting like it’s a new language or they are the same
Shell scripting is a broad term that bash scripting falls under. Bash is just 1 shell among many other shells like ksh, zsh. Each shell will have its own peculiarities but most should support original sh commands / syntax. So to answer your last question, it's mostly like learning 1 language.
Its a domain who is developed by ms , which is only found in winserver systems , where in an enterprise many computer connected into a single domain , so they can communicate each other n do stuff remotely , also admins can create group policy and manage permissions. Eg for a college or an big enterprises most likely have an Active directory.
@@8080VB I understand that but what I mean is when he used AD network words . I was thinking is there any networking technology in AD apart from literal networking we do to connect devices ?
Great video, im really enjoying this series and it couldnt of happened at a better time. I'm currently studying for my CRTP exam - 1st chapter of the study material provided covers powerview. In the test lab environment I have normal user privileges and i cant run powerview as windows defender blocks it for being malicious content. Do you have any tips or references on how to gain rights to run such scripts like powerview? I did set the execution policy to bypass, this gets access denied to registry key but can be bypassed by doing what you displayed in the video - running it from cmd(thanks!).
Just in time im preparing for the OSCP and i gain so much information from ur videos .. thanks alot
same, thanks alot!
Same working on the OSCP as well
Thank You. You always keep me up-to-date with "know-how" things. When i got few sources to study with same content and one of them Your tutorial - I choose Your's coz it clean and easy to understand.
Your explanation style is awesome
Thank you for this kind of video. Your videos are always amazing. I learn a lot from your video.
Keep them coming my guy 🔥🔥🔥
BIG THANK YOU for YOUR INTENSIVE WORK FOR US!!!!!
Amazing video....❤️🤩 Thank you so much....😍😘
TY for great videos! 😃
Tnks for all video !! ❤️
Very interesting video bro
Hi HackerSploit, thanks for the tutorial. It's very helpful.
How to identify the version of PowerView in use? Because, some of the commands in the cheatsheet such as 'Get-DomainUser' is not working in this version in THM.
You are an angel
plz keep doing these videos
Love you videos buddy
WOW, U r teaching at us 4:38 AM, is it kali time error or ... .
I think the regular windows defender would block the script, and basically any antivirus product. I wish THM would add the basics on disabling EDR / antivirus and applockers rule in their challenge, or demo some of the common in-memory iex techniques
We will cover AD evasion as we progress.
Please Someone answer this
Is shell scripting the same as bash scripting or if I learn shell scripting do I have to learn bash scripting like it’s a new language or they are the same
Shell scripting is a broad term that bash scripting falls under. Bash is just 1 shell among many other shells like ksh, zsh. Each shell will have its own peculiarities but most should support original sh commands / syntax. So to answer your last question, it's mostly like learning 1 language.
@@damonlee7055 Thank You So Much
I have one question sir, hope you answer this .. im sorry if it can be silly you say active directory network what do you mean by that ?
Its a domain who is developed by ms , which is only found in winserver systems , where in an enterprise many computer connected into a single domain , so they can communicate each other n do stuff remotely , also admins can create group policy and manage permissions. Eg for a college or an big enterprises most likely have an Active directory.
A computer registered in a Domain. Some computers have a local account, if it's not local it's AD. With AD theirs others PAssword policies, etc.
@@8080VB I understand that but what I mean is when he used AD network words . I was thinking is there any networking technology in AD apart from literal networking we do to connect devices ?
@@aziz5901 whats your goal?
Great job. Can u post a document of the commands? Thanks
Working on a GitHub repo that will highlight all the commands used.
Nice Video
keep posting about acitve directory
very good video, BUT as caveat remember most of those commands REQUIRE to be ALREADY administrator...
Great video, im really enjoying this series and it couldnt of happened at a better time. I'm currently studying for my CRTP exam - 1st chapter of the study material provided covers powerview. In the test lab environment I have normal user privileges and i cant run powerview as windows defender blocks it for being malicious content. Do you have any tips or references on how to gain rights to run such scripts like powerview? I did set the execution policy to bypass, this gets access denied to registry key but can be bypassed by doing what you displayed in the video - running it from cmd(thanks!).
We will cover IDS and AV evasion.
There are AMSI bypass strings if you look it up. I believe CRTP labs material cover it
@@socat9311 Yep, it is covered - i felt the content for the crtp was a bit all over the place but in saying that i was able to pass the crtp first try
It's covered in the lab manual how to use invisi shell and bypass AMSI
Please make video on bufferoverflow pls?
Working on it.
Nice
What's the point of power view if it will more than likely be blocked by windows firewall immediately
This video highlights the enumeration process. We will cover AD and IDS evasion as we progress.
Ok ok . But all of this is not cough by AV? or for this what we have to do to mitigate ? Tnx
@@HackerSploit awesome can't wait!
@ppetrix caught by AV immediately. To mitigate it you need to use bypassing AV techniques or turn of the firewall off.
a little comment for the algo
👍👍👍
superd
AND IT'S FREE🥺
while hackersploit giving a salute to guys, ippsec already made nmap scan and have changed the hosts file.
Wym?