How To Perform An Internal Pentest On Active Directory 2024 | Prep For Certs PJPT PNPT OSCP CRTP

Поделиться
HTML-код
  • Опубликовано: 11 окт 2024
  • Join this channel to get access to perks:
    / @infosecpat
    #cybersecurity #hacker #activedirectory
    How To Perform An Internal Pentest On Active Directory 2024 | Prep For Certs PJPT PNPT OSCP CRTP
    Intrested in 1:1 coaching / Mentoring with me to improve skills and career advestment? Book today at calendly.com/t...
    Get IT Training From ACI Learning today! Link to get 30% off ACI Learning (ITProTV) go.itpro.tv/in... and use promo code INFOSECPAT30.
    InfoSec Pat Merch Store: infosec-pat.my...
    Cool Hacking merch: myhackertech.c...
    Use Coupon Code INFOSECPAT for 10% off
    TCM Security Training: academy.tcm-se...
    Learn cybersecurity and hacking today with HTB links below.
    HackTheBox Sign Up Here: affiliate.hack...
    HackTheBox Academy Sign Up Here: affiliate.hack...
    Stay Protected online with NordVPN:
    Nord Links
    NordVPN: go.nordvpn.net...
    NordPass: go.nordpass.io...
    NordLocker: go.nordlocker....
    Please check out my Amazon Store: www.amazon.com...
    💸Support The Channel💸
    ___________________________________________
    Please join as a member and help grow the channel. I would appreciate it so much and join the family.
    📱Social Media📱
    🌎FOLLOW ME ALLOVER ➡IG: @InfoSecPat , Twitter: @InfoSecPat, LinkedIn: bit.ly/Pats-Li...
    My Channel Is About Free IT Training And Cybersecurity Education, Lives With Others In The Field And So Much More :)
    🔥HACK THE RUclips ALGORITHM ➡ Like, Comment, Share & Subscribe!
    🙏SUPPORT THE CHANNEL ➡ Join as a member today bit.ly/join-inf...
    🤝 SPONSOR THE CHANNEL ➡ Email: Pat@infosecpat.com
    Disclaimer:
    All my videos are for learning and education purposes. Please always have permission to do an assessment on your target or client. I do all my videos in my home lab. I have full permission to my home network lab and VMs. Thank you and let's have fun learning together!

Комментарии • 11

  • @InfoSecPat
    @InfoSecPat  9 месяцев назад +4

    Windows Server 2022, Not 2019.

  • @DG-if3gs
    @DG-if3gs 9 месяцев назад +1

    good example. thanks.

    • @InfoSecPat
      @InfoSecPat  9 месяцев назад +1

      You are welcome!

  • @PoRkch0p523
    @PoRkch0p523 9 месяцев назад +1

    Woot woot!! 🎉

  • @timecop1983Two
    @timecop1983Two 6 месяцев назад +1

    Thanks alot again! One day this will be like John Hammonds channel

    • @InfoSecPat
      @InfoSecPat  6 месяцев назад +1

      Wow, thanks! John is amazing and a good friend. He is killing it.

    • @alechernandez5506
      @alechernandez5506 2 месяца назад

      No sir. This is InfoSecPat’s channel With his own amazing content and style

  • @ericmoore4515
    @ericmoore4515 7 месяцев назад

    Hello! I got a question. I have virtual box configured with Active Directory and 2 workstations. I have Kali as my attack machine. The Questions is around Responder. Are you suppose to have the interface / nic card of the kali configured as a span port so Responder can see all traffic??? I have my VMs setup in Virtual box I can't see the workstation hash as it authenticates against the AD. BUT if I try to auth against the kali from the workstation responder will work and I see the hash. Am I doing something wrong?

  • @EARN-750-DAILY_JOB_FOR_U
    @EARN-750-DAILY_JOB_FOR_U 9 месяцев назад

    "Most of the important things in the world have been accomplished by people who have kept on trying when there seemed to be no help at all." -Dale Carnegie