Hacking & Defending Active Directory
One of the most common tools to structure and organize users and computers in a business environment is Microsoft’s Active Directory. However, Active Directory also happens to be one of the most exploited tools that hackers utilize to gain access to corporate networks. This live Active Directory training class will not only teach you the most common exploits hackers use to break into networks, it will also teach you the steps that you need to take to remediate and patch these exploits. You’ll gain practical skills and knowledge that can be immediately applied to secure your environment.
Description
Active Directory Overview
- What is Active Directory?
- Physical Active Directory Components
- Logical Active Directory Components
Pre-Compromise AD Attacks and Defenses
- LLMNR Poisoning Attacks and Defenses?
- SMB Relay Attacks and Defenses?
- IPv6 Attacks and Defenses?
- AS-REP Roasting Attacks and Defenses?
- Passback Attacks and Defenses?
- Inside the Attacker’s Mindset?
Post-Compromise AD Enumeration
- Reviewing common enumeration tools, such as: Bloodhound, Plumhound, Pingcastle, ldapdomaindump, and much more
- Understanding common mistakes from an Administrator’s perspective
Post-Compromise AD Attacks and Defenses
- Pass Attacks and Defenses
- Kerberoasting Attacks and Defenses
- Token Impersonation Attacks and Defenses
- URL File Attacks and Defenses
- GPP Attacks and Defenses
- Credential Dumping Attacks and Defenses
- Persistence Attacks and Defenses
- Inside the Attacker’s Mindset – Revisited
AD Case Studies
- Real case studies from real pentests AKA “How they got owned”
Prerequisites
Target Audience
- System Administrators and IT Professionals
- Network Engineers and Administrators
- Organizations that require their teams to be proficient in Active Directory security to protect against cyber threats.
- Aspiring Penetration Testers and Cybersecurity Professionals
- Individuals looking for extra guidance as they study for the PJPT.
- Anyone looking to advance their knowledge, skills, and methodologies