У нас вы можете посмотреть бесплатно Unlocking The Power Of Kerberos Relaying: Elevating Privileges And Gaining Persistence или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:
Если кнопки скачивания не
загрузились
НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу
страницы.
Спасибо за использование сервиса ClipSaver.ru
In this video, we break down Kerberos relaying to Active Directory Certificate Services (ADCS)—a powerful attack technique that can be leveraged for privilege escalation and persistence in Active Directory environments. You'll learn: ✅ How attackers exploit Kerberos relaying to request malicious certificates ✅ The impact of abusing ADCS for domain persistence and lateral movement ✅ Detection strategies using SIEM and defensive measures to mitigate the risk By understanding these tactics, you can proactively defend against them and strengthen your Active Directory security. 🔗 Links & Resources: More on Kerberos relaying & ADCS: https://dirkjanm.io/relaying-kerberos... https://www.synacktiv.com/en/publicat... 💬 Drop your questions in the comments & don’t forget to like and subscribe! 💬 Our new game is to name who the person being attacked is in the comments to earn points. 100 points will get you some hacker stickers. #KerberosRelaying #ADCS #ActiveDirectory #Cybersecurity #ThreatHunting Chapters 00:00 Relaying Kerberos 00:59 Kerberos Relaying with DNS 02:44 Checking out the Machine Cert 04:06 Authenticating with the Machine Account 05:31 Relaying Kerberos with LLMNR 06:15 Using Responder for Relaying 07:49 Checking out the User Cert 08:35 Logging in with the User Cert 10:07 Detecting these Threats 10:19 Detecting MiTM6 12:16 Detecting Certificate Usage 13:19 Outro