One of the main targets for advanced threats is the Active Directory (AD) environment since it is responsible for authentication and authorization in a domain. If misconfigured, the AD could allow an attacker to obtain domain administrator privileges and move laterally on the environment. In this course, Active Directory Privilege Escalation and Lateral Movement, you’ll learn to discover and exploit vulnerabilities that allow moving laterally and escalating privileges. First, you’ll explore how to gain access to other accounts in the domain and impersonate users. Next, you’ll discover how to exploit weak Access Control Lists (ACLs) to obtain domain admin privileges. Finally, you’ll learn how to dump the hashed passwords of every user in the domain so you can access any server you want. When you’re finished with this course, you’ll have the skills and knowledge of AD exploitation needed to escalate privileges and move laterally.
Active Directory Privilege Escalation and Lateral Movement
via Pluralsight
Overview
One of the main targets for advanced threats is the Active Directory (AD) environment since it is responsible for authentication and authorization in a domain. If misconfigured, the AD could allow an attacker to obtain domain administrator privileges and move laterally on the environment. In this course, Active Directory Privilege Escalation and Lateral Movement, you’ll learn to discover and exploit vulnerabilities that allow moving laterally and escalating privileges. First, you’ll explore how to gain access to other accounts in the domain and impersonate users. Next, you’ll discover how to exploit weak Access Control Lists (ACLs) to obtain domain admin privileges. Finally, you’ll learn how to dump the hashed passwords of every user in the domain so you can access any server you want. When you’re finished with this course, you’ll have the skills and knowledge of AD exploitation needed to escalate privileges and move laterally.
Taught by
Ricardo Reimao