🖥Active Directory Lab: Enumeration and Exploitation 🔐

Learn about Active Directory penetration testing enumeration and exploitation using tools like Impacket, Kerbrute, and CrackMapExec. This post focuses on initial external enumeration and exploitation; from the perspective of having access to the AD network but have no account credentials and little information about the internal network. You will learn:

  • Target enumeration with Nmap, CME, Nbtscan
  • Username enumeration with Nmap and Kerbrute
  • Exploit misconfigurations with Windapsearch and…

--

--

--

https://robertscocca.com/

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

The Biggest Data Breaches of 2019 so far

Nym | Groundbreaking Privacy Infastracture Crypto project

Ukrainians Are Preparing to Shed Web Gain Access To

2 Minute Guide: How to keep safe in 2020

{UPDATE} Ghost Bike Stunts Hack Free Resources Generator

The Bouncer, The Stateless Web, Cookies(JSON WEB TOKEN)

{UPDATE} Blood Aerna Hack Free Resources Generator

How to Read Your Husband’s Deleted Text Messages?

How to Read Your Husband’s Deleted Text Messages?

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Robert Scocca

Robert Scocca

https://robertscocca.com/

More from Medium

PRACTICAL MALWARE ANALYSIS LAB PART — I

My approach to CTF creation

CYBER CRIME TRENDS 2020–2021

Gaining access to a network with Office macros — Pentesting and red teaming