Secret weapon how to promote your YouTube channel
Get Free YouTube Subscribers, Views and Likes

Real World Windows Pentest Tutorial (demos of Top 5 Active Directory hacks)

Follow
David Bombal

A big shoutout to TCM Security for sponsoring this video. Register now to receive a 50% discount on your first month at the TCM Security Academy, potentially making your most significant step toward a career in ethical hacking. Go here: https://davidbombal.wiki/3vQsqWm

// TCM Security SOCIAL//
LinkedIn :   / tcmsecurityinc  
Twitter :   / tcmsecurity  
YouTube (The Cyber Mentor):    / thecybermentor  
Discord:   / discord  
Instagram:   / tcmsecurity  
Facebook:   / tcmsecure  
TikTok:   / tcmsecurity  
Academy Website: https://academy.tcmsec.com/
TCM Certifications: https://certifications.tcmsec.com/
Discord:   / discord  
Website: https://tcmsec.com/
Breach Point Website: https://breachpoint.com/

// Heath Adam’s SOCIAL //
LinkedIn:   / heathadams  

// Resources REFERENCE //
How to build and active directory hacking lab online:    • How to Build an Active Directory Hack...  

// David's SOCIAL //
Discord:   / discord  
X:   / davidbombal  
Instagram:   / davidbombal  
LinkedIn:   / davidbombal  
Facebook:   / davidbombal.co  
TikTok:   / davidbombal  
YouTube:    / @davidbombal  

// MY STUFF //
https://www.amazon.com/shop/davidbombal

// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: [email protected]

// MENU //
00:00 Introduction
01:30 Labs Options
03:03 How Do The Labs Work?
04:32 Where Should You Start?
07:25 TCM Certifications
09:40 LLMNR Poisining
13:02 Lab Example #1 (LLMNR Poisoning)
20:15 Best Defences
21:01 LLMNR: Mitigation
23:17 SMB Relay
27:07 Lab Example #2 (SMB Relay)
39:43 When To Run Pentest
41:01 Is Shell Popping Necessary?
43:43 Why You Should Have A Pentest
46:09 SMB Relay Mitigation
48:18 Lazy Security
49:27 Favourite Password Manager
50:00 Gaining Shell Access
51:37 Is IPv6 Common?
56:08 Should You Disable IPv6?
57:04 Do Large Organizations Use IPv6 Properly?
57:33 Lab Example #3 (IPv6)
01:02:04 As Administrator
01:06:21 Pentests Are Important
01:07:30 IPv6 Mitigation
01:09:56 Pass The Password / Pass The Hash
01:14:00 The CME DB
01:14:32 Lab Example #4 (The CME DB)
01:19:15 Pass The Hash / Pass the Password Mitigation
01:20:12 Real World VS CTFs
01:21:35 Kerberoasting
01:24:11 Lab Example #5 (Kerberoasting)
01:26:38 Kerberoasting Mitigation
01:27:50 Are Window's 'Default Settings' Safe?
01:28:53 Reach Out to TCM Security
01:29:16 Real Life Pentest Case Studies
01:35:18 Lab VS Real World
01:37:15 How To Access The Internal Network
01:39:30 Where To Get Started
01:41:11 Conclusion
01:41:46 Outro

pentest
pentester
hack
hacker
hacking
ethical hacking
ethical hacker course
ethical hacker
windows ad hacking
microsoft windows
microsoft windows hack
windows 11 hack
windows 11 hacking


Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!

Disclaimer: This video is for educational purposes only.

#hacker #pentester #microsoft

posted by urwisyt