У нас вы можете посмотреть бесплатно HackTheBox – Forest Walkthrough | BloodHound, AS-REP Roasting, DCSync (GenericAll, WriteDACL) или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:
Если кнопки скачивания не
загрузились
НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу
страницы.
Спасибо за использование сервиса ClipSaver.ru
In this HackTheBox Active Directory machine, we perform unauthenticated enumeration on SMB and Kerberos services, exploit AS-REP Roasting without credentials to capture and crack hashes, use BloodHound to map out a complex attack path through Account Operators and Enterprise Key Admins groups, quickly chain group membership modifications with DCSync privilege escalation before detection, and finally perform a DCSync attack to dump all domain credentials for full domain compromise. This machine demonstrates advanced Active Directory enumeration and privilege escalation techniques. If you're learning Active Directory attacks, OSCP, or just love seeing machines get popped... this one's for you. 📂 Scripts and Commands: https://github.com/strikoder/CTFS/blo... 🏠 Room Link: https://www.hackthebox.com/machines/f... -------- ⏱️ Timestamps: 00:00 - Intro & Target Overview 01:10 - Unauthenticated SMB Enumeration 05:26 - Unauthenticated Kerberos Checks 06:36 - AS-REP Roasting Without Credentials 07:07 - Cracking AS-REP Hash with Hashcat 11:07 - User Flag Capture 18:30 - BloodHound Data Collection 20:40 - Attack Path Analysis 29:30 - Adding User to Target Group 29:35 - Granting DCSync Rights with dacledit 29:55 - DCSync Attack with secretsdump 30:33 - Pass-the-Hash as Administrator & Root Flag & Wrap-up -------- Follow me for more real-world hacking walkthroughs, live streams, and cert prep content 👇 💻 Labs GitHub: https://github.com/strikoder 🎥 Streams & Short Content Twitch: / strikoder Instagram: / strikoder TikTok: / strikoder 💬 Community & Discussions Discord Server: / discord X (Twitter): https://x.com/Strikoder 📨 Official Contact LinkedIn: / strikoder Email: strikoder@gmail.com More videos coming soon on PNPT, and OSCP prep. Stay tuned, and thanks for the support! #forest #asreproasting #bloodhound #dcsync #accountoperators #dacledit #genericwrite #oscp #pt1 #hackthebox #tryhackme #portswigger #portswiggeracademy #activedirectory #linux #windows #ethicalhacking #cybersecurity #pentesting #ctf #infosec #enumeration #privilegeescalation #windowshacking #networksecurity #bugbounty #RedTeam #capturetheflag #hackingtools #cyberseclabs #hackermindset #Nmap #terminal #strikoder