:Search:

Advanced Pen Testing Techniques for Active Directory

Torrent:
Info Hash: 8F2A4843A72C75F7689C995F0BEE00E9ABE1932E
Thumbnail:
Similar Posts:
Uploader: tutsnode
Source: T Logo Torrent Galaxy
Downloads: 1093
Language: English
Description:
None
Category: Other
Size: 257.0 MB
Added: Aug. 30, 2023, 5:32 p.m.
Peers: Seeders: 17, Leechers: 6 (Last updated: 10 months, 3 weeks ago)
Tracker Data:
Tracker Seeders Leechers Completed
udp://open.stealth.si:80/announce 4 2 733
udp://exodus.desync.com:6969/announce 2 0 7
udp://tracker.cyberia.is:6969/announce (Failed to scrape UDP tracker) 0 0 0
udp://tracker.opentrackr.org:1337/announce 6 1 163
udp://tracker.torrent.eu.org:451/announce 4 1 178
udp://explodie.org:6969/announce (Failed to scrape UDP tracker) 0 0 0
udp://tracker.birkenwald.de:6969/announce 0 1 0
udp://tracker.moeking.me:6969/announce (Failed to scrape UDP tracker) 0 0 0
udp://ipv4.tracker.harry.lu:80/announce (Failed to scrape UDP tracker) 0 0 0
udp://tracker.tiny-vps.com:6969/announce 1 0 12
udp://tracker.rarbg.torrentbay.st:6969/announce 0 1 0
Files:
  1. 07 - Using rubeus to take over the domain.mp4 19.0 MB
  2. TutsNode.net.txt 63 bytes
  3. 05 - What is Active Directory.srt 9.8 KB
  4. 01 - Understand and test the security of identity providers.srt 1.3 KB
  5. 01 - Understand Active Directory's role in security.srt 8.1 KB
  6. 02 - What you should know.srt 938 bytes
  7. 09 - Using smartcards to gain privileged access.srt 7.8 KB
  8. 03 - Disclaimer.srt 2.3 KB
  9. 03 - Interact with LDAP at the command line.srt 4.6 KB
  10. 0 512 bytes
  11. 07 - Access LDAP services with a GUI client.mp4 17.8 MB
  12. 10 - Set the BloodHound loose.srt 7.2 KB
  13. 07 - Access LDAP services with a GUI client.srt 7.1 KB
  14. 06 - Running a shadow attack.srt 6.8 KB
  15. 07 - Using rubeus to take over the domain.srt 6.5 KB
  16. 04 - The LDAPAdmin tool.srt 1.9 KB
  17. 01 - Set up for testing.srt 6.2 KB
  18. 05 - Forge a golden ticket.srt 5.9 KB
  19. 08 - Add users and computers to a domain.srt 4.4 KB
  20. 06 - Interact with Active Directory at the command line.srt 2.4 KB
  21. 04 - Run a no-preauthentication attack.srt 3.9 KB
  22. 04 - Kerberos brute-forcing attacks.srt 3.8 KB
  23. 06 - Investigate the SYSVOL share.srt 3.5 KB
  24. 08 - Relaying attacks to get a certificate.srt 3.4 KB
  25. 05 - Use CrackMapExec to access and enumerate AD.srt 3.1 KB
  26. 09 - Active Directory security audit.srt 2.6 KB
  27. 02 - Extract the AD hashes.srt 3.0 KB
  28. 02 - The LDAP protocol.srt 3.0 KB
  29. 02 - Remote extraction of AD hashes.srt 2.9 KB
  30. 03 - Password spraying Active Directory.srt 2.8 KB
  31. 03 - Carry out a Kerberos roasting.srt 2.2 KB
  32. 01 - Next steps.srt 1.7 KB
  33. 01 - Specific Active Directory attacks.srt 1.6 KB
  34. 07 - Take advantage of legacy data.srt 1.6 KB
  35. [TGx]Downloaded from torrentgalaxy.to .txt 585 bytes
  36. 1 66.4 KB
  37. 10 - Set the BloodHound loose.mp4 17.3 MB
  38. 2 189.8 KB
  39. 05 - Forge a golden ticket.mp4 16.7 MB
  40. 3 12.2 KB
  41. 01 - Set up for testing.mp4 13.9 MB
  42. 4 121.5 KB
  43. 05 - What is Active Directory.mp4 13.6 MB
  44. 5 148.0 KB
  45. 09 - Using smartcards to gain privileged access.mp4 13.4 MB
  46. 6 119.7 KB
  47. 04 - Run a no-preauthentication attack.mp4 13.0 MB
  48. 7 24.7 KB
  49. 01 - Understand Active Directory's role in security.mp4 12.2 MB
  50. 8 71.0 KB
  51. 06 - Running a shadow attack.mp4 12.0 MB
  52. 9 207.9 KB
  53. 08 - Add users and computers to a domain.mp4 11.5 MB
  54. 10 1.7 KB
  55. 08 - Relaying attacks to get a certificate.mp4 8.8 MB
  56. 11 192.5 KB
  57. 02 - Extract the AD hashes.mp4 8.1 MB
  58. 12 202.8 KB
  59. 03 - Interact with LDAP at the command line.mp4 8.0 MB
  60. 13 19.8 KB
  61. 05 - Use CrackMapExec to access and enumerate AD.mp4 7.3 MB
  62. 14 218.2 KB
  63. 03 - Password spraying Active Directory.mp4 7.1 MB
  64. 15 161.2 KB
  65. 06 - Investigate the SYSVOL share.mp4 6.4 MB
  66. 16 101.5 KB
  67. 04 - Kerberos brute-forcing attacks.mp4 6.1 MB
  68. 17 174.0 KB
  69. 02 - Remote extraction of AD hashes.mp4 5.3 MB
  70. 18 200.2 KB
  71. 07 - Take advantage of legacy data.mp4 5.1 MB
  72. 19 117.0 KB
  73. 03 - Carry out a Kerberos roasting.mp4 4.5 MB
  74. 20 34.2 KB
  75. 02 - The LDAP protocol.mp4 3.9 MB
  76. 21 67.7 KB
  77. 09 - Active Directory security audit.mp4 3.6 MB
  78. 22 135.8 KB
  79. 06 - Interact with Active Directory at the command line.mp4 3.6 MB
  80. 23 157.5 KB
  81. 01 - Understand and test the security of identity providers.mp4 3.4 MB
  82. 24 77.3 KB
  83. 04 - The LDAPAdmin tool.mp4 3.3 MB
  84. 25 215.0 KB
  85. 03 - Disclaimer.mp4 2.8 MB
  86. 26 249.3 KB
  87. 01 - Specific Active Directory attacks.mp4 2.3 MB
  88. 27 187.8 KB
  89. 01 - Next steps.mp4 2.2 MB
  90. 28 20.2 KB
  91. 02 - What you should know.mp4 1.2 MB

Discussion