Back

Active Directory Pentesting Engineer

This intensive training course provides participants with hands-on experience in hacking techniques, specifically focusing on Active Directory exploitation.

Tarek

Lead Trainer

Description
Coming soon

Course Curriculum

Active Directory introduction

4 lessons

1. Active Directory components

2. Trees and forests in Active Directory

3. Interacting with AD (admin, client and hacker tools and commands)

4. Basic Active Directory enumeration

Entra ID Introduction

3 lessons

5. Why Entra ID?

6. Introduction to Entra ID

7. Difference between Entra ID and on-prem AD

User Accounts Deep Dive

4 lessons

8. Understanding security principles

9. Deep dive into security contexts

10. Understanding SID/RID and their abuses

11. Hunting for interesting users

Groups and OUs

3 lessons

12. What are groups and OUs and why do we need both

13. Understanding types, scopes and attributes

14. Enumerating and hunting for interesting groups and OUs

Access Control in Details

4 lessons

15. Understanding ACEs, ACLs, DACLs and SACLs

16. Practical examples of bad and exploitable permissions

17. Enumerating and honing on bad permissions

18. Abusing bad permissions for privilege escalation

Group Policy Objects

3 lessons

19. Understanding GPOs and their typical uses

20. Enumerating and identifying exploitable GPOs

21. Exploiting GPOs for persistence and escalation

Lateral Movement

2 lessons

22. How lateral movement happens in AD environments

23. Abusing different protocols for lateral movement

Bloodhound: Discovering Attacks Paths

3 lessons

24. Bloodhound for offense and defense

25. Bloodhound setup and basic queries

26. Custom queries with Bloodhound

On-prem Password Attacks

4 lessons

27. Password profiling

28. Understanding password policies

29. Enumerating password policies

30. Password spraying

Entra ID Password Attacks

3 lessons

31. Username enumeration in Entra ID

32. Safe password spraying

33. Conditional Access Policies and possible bypasses

Hashes and Authentication Protocols

6 lessons

34. Different types of hashes

35. Understanding MS-NLMP

36. Capturing NTLMv2 hashes

37. Understanding LSASS

38. Dumping LSASS

39. Pass-the-hash

Kerberos Attacks

6 lessons

40. Kerberos deep dive

41. Finding and exploiting AS-REP Roastable accounts

42. When and how to Kerberoast

43. Silver Ticket Attack

44. Golden Ticket Attack

45. Delegation Attacks