У нас вы можете посмотреть бесплатно Stacy's Office Parrot CTFs Red Team Lab Walkthrough | Red Teaming Active Directory или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:
Если кнопки скачивания не
загрузились
НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу
страницы.
Спасибо за использование сервиса ClipSaver.ru
Dive into Stacy's Office – a Parrot CTFs Active Directory lab tailored for red teamers aiming to hone their skills in network infiltration, privilege escalation, and domain exploitation. This in-depth walkthrough takes you through each step of the attack process, from the initial reconnaissance to full control over the Domain Controller. Ideal for intermediate to advanced red teamers, this lab simulates a complex corporate Active Directory environment packed with challenges. Blog Writeup: https://parrot-ctfs.com/blog/stacys-o... Lab Machine: https://parrot-ctfs.com/dashboard/vie... Chapters: 00:00 - Introduction 00:30 - Initial Nmap scan 02:00 - Using ffuf to scan for .md files 03:40 - Exfiltrating and reading README.md 04:19 - Initial foothold through SSH 04:40 - Enumerating Initial foothold 07:00 - Setting up sock4 proxy 08:10 - Using proxy chains to enumerate hosts 12:00 - Using SSHuttle to pivot via SSH 14:00 - Additional Foothold #1 via RDP 16:00 - Kerberoasting with low priv user 18:13 - Cracking Administrators hash 20:00 - Administrator compromised / Outro Steps: Initial Reconnaissance – Begin with an Nmap scan of open ports to identify SSH (port 22) and HTTP (port 80) services. Discover the importance of web directory fuzzing with FFuF to locate hidden files and gather valuable credentials. Gaining Initial Access – Using the credentials gathered from the readme file, we gain a foothold on the web server. We’ll explore key enumeration steps, from checking system files and configurations to understanding the host environment before pivoting further. Internal Network Pivoting – Learn how to use SSH to set up a SOCKS4 proxy for secure traffic forwarding. With proxy chains, enumerate internal hosts and continue the attack path across the 10.20.0.0/24 subnet. Privilege Escalation – With a new set of credentials, we achieve access to additional hosts. By escalating privileges, we unlock administrative capabilities, bringing us closer to the Domain Controller. Domain Controller Exploitation – Moving from footholds to complete control, we detail our approach to compromising the Domain Controller. Learn how to use tools like realm to identify Active Directory settings and finalize our control over the AD environment. Key Techniques and Tools Covered: Nmap, FFuF, SSH tunneling, proxychains, and sshuttle Manual and automated enumeration tactics (Linpeas) Privilege escalation techniques within a corporate AD environment Insights into Kerberos and Active Directory structures Whether you’re new to red teaming or seeking to refine your skills, this walkthrough offers valuable insights into every stage of a red team engagement. From exploiting misconfigurations to understanding AD structures, each step is broken down to provide a complete learning experience. Perfect for Red teamers, penetration testers, and cybersecurity enthusiasts wanting to practice realistic AD exploitation in a structured CTF environment. #redteaming #cybersecurity #pentesting #htb #hackthebox #parrotctfs #hacking #hackingawareness #hackingcommunity #activedirectory #capturetheflag #tryhackme #proactivecybersecurity #ethicalhacking