Date | Day | Time | Duration |
24 August | Tuesday | 09:00-17:00 SGT/GMT +8 | 8 Hours |
25 August | Wednesday | 09:00-17:00 SGT/GMT +8 | 8 Hours |
Active Directory is at the heart of 95% of the Global Fortune 1000. Almost every enterprise in the world uses AD. However, common misconfigurations prevail, allowing for threat actors to take full control over entire infrastructures. Despite this, core security concepts related to AD go misunderstood and often ignored.
In this course we introduce common Active Directory misconfigurations, what their root cause is and how they can be abused. The course focuses on abusing real life misconfigurations and steers away from the traditional penetration testing tools and methodologies.
From our experience the audience that most benefited from the course are:
Although this is beginner-friendly course, it does require some basic prerequisites. Attendees should be familiar with concepts such as:
Active Directory introduction
โ Components
โ Trees and forests
โ Enumeration
User Account deep dive
โ Security principles
โ Security contexts
โ SID/RIDs
โ UPN
โ User enumeration
Groups and OUs
โ Types and scope
โ Difference between groups and OUs
โ Attributes
โ Enumerating group and OUs
Computer Objects
โ Understanding and enumerating computer objects
Access Control
โ ACEs
โ ACLs
โ DACLs/SACLs
โ Understanding bad permissions
โ Enumerating permissions
โ Abusingpermissions
Password Attacks
โ Password profiling
โ Understanding password policies
โ Enumerating password policies
โ Password spraying
Lateral Movement
โ PSExec, WMI, PS
Hash and Authentication Protocols
โ Different types of hashes
โ MS-NLMP
โ Capture NTLMv2 hashes
Dumping Hashes
โ Understanding LSASS
โ Understanding Mimikatz modules and output
โ Pass the hash
Kerberos
โ Kerberos deep dive
โ AS-REP Roasting
โ Kerberoasting
โ Silver Ticket
โ Golden Ticket