У нас вы можете посмотреть бесплатно Attacking ADCS Full Course или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:
Если кнопки скачивания не
загрузились
НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу
страницы.
Спасибо за использование сервиса ClipSaver.ru
Attacking Active directory certificate services full course //////////////////////////////// Support Me ///////////////////////////////// patreon : / hichamelaaouad ///////////////////////// description ///////////////////////////// Whenever I have an Active Directory pentest, most of the time I see LDAPS and internal websites using HTTPS, but I never asked where those protocols or applications got their certificates , or maybe they’re signed from a public trusted certificate authority or a local certificate authority. Since we are dealing with Active Directory, it’s usually going to be ADCS (Active Directory Certificate Services). That's why I decided to spend the last three months learning how to attack and abuse ADCS, and at the same time, create this full course for you to learn as well. In this course, we’re going to start by buidling our adcs lab, then explaining of the key elements to understanding how it works , which is PKI (Public Key Infrastructure). Then, we’ll move into the installation of ADCS and how sysadmins use it to secure their local infrastructure. We’ll also cover ADCS components like what a PKInit is, what a template is, CSR. Then we’ll dive into the most interesting part: abusing the misconfigurations left by sysadmins. To better understand this, we’ll create those misconfigurations in our lab, and then we’ll abuse them to escalate privileges or establish persistence. All the modules are well-organized in this course. Feel free to jump to any part if you’re already familiar with it, or return to a section if you need a refresher. I’d love for you to support this channel by subscribing, liking, and leaving a comment below regarding any mistakes or improvements we should implement in future videos. Let’s get started. -----------------------------keywords---------------------------------- DCSync attack, Active Directory security, Domain credentials, Cybersecurity, Hackers, Windows security, Microsoft Active Directory, Privilege escalation, Penetration testing, IT security, Insider threats, Network security, Red teaming, Social engineering, Credential harvesting, Cyber threats, Identity theft, Cybercrime, Data breach, Cyber defense, Malware, Ransomware, Phishing, Spoofing, Encryption, Authentication, Authorization, Two-factor authentication, Multi-factor authentication, Access control, Firewall, Intrusion detection, Intrusion prevention, Vulnerability scanning, Patch management, Security policies, Incident response, Disaster recovery, Business continuity, Compliance, Risk management, Threat intelligence, Endpoint security, Cloud security, Mobile device security, Application security, Web security, Email security, Virtual private network (VPN), Network segmentation, Data loss prevention, Security awareness training, Security assessment, Security audit, Cyber insurance, Digital forensics, Cyber law, Cyber ethics, Cyber hygiene, Cyber bullying, Cyber stalking, Cyber terrorism, Cyber warfare, Artificial intelligence (AI) security, Internet of Things (IoT) security, Blockchain security, Big data security, Machine learning security, Dark web, Cyber espionage, Cyber sabotage, Cyber vigilante, Cyber activism, Cyber sovereignty, Cyber diplomacy, Cyber resilience, Cyber culture, Cybersecurity careers, Cybersecurity certifications, Cybersecurity trends, Windows security, network security, ethical hacking, red team, blue team,privilege escalation, lateral movement, Active Directory attacks, AD security, AD exploitation, network penetration testing, network security testing, vulnerability assessment, security assessment, ethical hacking tutorial, cybersecurity tutorial, cybersecurity education, cybersecurity skills, cybersecurity certification, cybersecurity career, cybersecurity jobs, IT jobs, IT career, cybersecurity industry, cybersecurity trends, cybersecurity news, cybersecurity best practices, cybersecurity tools, cybersecurity software, cybersecurity framework, cybersecurity standards, cyber law, data privacy, compliance, regulatory compliance, industry compliance, security compliance, information security management, cybersecurity risk management, cybersecurity strategy, cybersecurity planning, cybersecurity framework, security architecture, cyber resilience, incident response, threat intelligence, security operations center, security analyst, penetration tester certification, ethical hacking certification, cybersecurity certification, security certification, IT certification, online cybersecurity training, online ethical hacking training, online security training, active directory training,kerberoasting,GetUsersSPN,GetUsersSPN.py,getusersspn.py,getusersspn ---------------------------------MENU--------------------------------- 00:00 intro 01:23 - What is a PKI ? 14:22 - ADCS installation 16:48 - How to use ADCS 20:35 - What is a template 20:55 - What is an EKU 21:25 - Creating a template 23:32 - What is a PIKINIT 26:09 - ESC1 31:12 - ESC2 33:37 - ESC3 37:07 - ESC8