Jump to content

Active Directory Exploitation By Chris Espinoza


Recommended Posts

537661809_oip.jpg
337.12 MB | 00:06:30 | mp4 | 1280X720 | 16:9
Genre:eLearning |Language:English



Files Included :
1 Decoding Authentication - Active Directory Protocols - NTLM.mp4 (11.85 MB)
2 Decoding Authentication - Active Directory Protocols - Kerberos.mp4 (15.82 MB)
3 Cracking the Perimeter with Password Spray.mp4 (9.91 MB)
4 Demo - Cracking the Perimeter with Password Spray Using Hydra.mp4 (15.94 MB)
5 Exploiting Network Protocols to Capture NTML Hashes.mp4 (8.67 MB)
6 Demo - Capturing NTLM Hashes Using Responder.mp4 (15.14 MB)
7 Dumping Credentials from Active Directory.mp4 (12.75 MB)
8 Demo - Dumping Credentials with Mimikatz.mp4 (21.42 MB)
1 Exploiting Weak Service Account Passwords in Kerberos Authentication.mp4 (11.97 MB)
2 Demo - Executing a Kerberoasting Attack with Rubeus.mp4 (17.09 MB)
3 Authentication Service Response (AS-REP) Attacks.mp4 (15.78 MB)
4 Demo - Cracking Service Accounts with ASP-REP Attacks.mp4 (16.49 MB)
5 Pass-the-Ticket (PtT) Attack.mp4 (10.43 MB)
6 Demo - Pass-the-Ticket (PtT) Attack Using Mimikatz.mp4 (18.54 MB)
7 Golden and Silver Tickets Creation and Usage.mp4 (13.03 MB)
8 Demo - Creating and Using Golden Tickets for Domain Wide Access.mp4 (20.17 MB)]
Screenshot
KZiUrgL5_o.jpg





https://ausfile.com/9pivr6q7esod


https://rapidgator.net/file/c8555ba99f534efb4dafb28e67add091/


https://turbobit.net/a5f45zdd2o37.html


Link to comment
Share on other sites

Please sign in to comment

You will be able to leave a comment after signing in



Sign In Now
×
×
  • Create New...