Set Up and Test ASREProast and Kerberoasting Attacks

Set Up and Test ASREProast and Kerberoasting Attacks

We create a small Active Directory lab using VirtualBox and a Windows Server Standard evaluation. We'll configure it to act as a Domain Controller and set up ASREPRoast and Kerberoasting attacks step by step.


?? Key Highlights:

- ??? Setting up the Domain Controller with ease.

- ??? Exploring the ASREPRoast Attack and making a user vulnerable.

- ?? Testing the ASREPRoast Attack to obtain password hashes.

- ???♂? Continuing with the Kerberoasting Attack and creating a vulnerable user.

- ?? Cracking hashes and gaining access.


?? Watch the full videos for practical insights and hands-on experience.

https://youtu.be/ZoaxkWVdluM

https://youtu.be/RePJhx8R3Ek

?? Remember, "Build it before breaking!"

#Cybersecurity #ActiveDirectory #Kerberoasting #ASREPRoast #EthicalHacking #InfoSec #offsec

要查看或添加评论,请登录

KEVIN VANEGAS的更多文章

  • LittlePivoting-Dockerlabs Walkthrough / WriteUp

    LittlePivoting-Dockerlabs Walkthrough / WriteUp

    Hello everyone, we continue exploring the Dockerlabs DockerLabs platform that I introduced in my previous video! This…

    5 条评论
  • AS-REP roasting with Crackmapexec/NetExec

    AS-REP roasting with Crackmapexec/NetExec

    This new Crackmapexec/NetExec series is a part of the Active Directory Lab series on my channel . With tools like…

  • Vulnerable Active Directory Lab

    Vulnerable Active Directory Lab

    I'm currently learning pentesting techniques for Active Directory, and I've been sharing my progress on YouTube. Today,…

  • Enumeration With BloodHound

    Enumeration With BloodHound

    As a cybersecurity student, I'm constantly seeking ways to expand my knowledge and skill set. Recently, I delved into…

  • Learning About DCSync Attacks in Active Directory

    Learning About DCSync Attacks in Active Directory

    I continued diving into exploitation techniques within Active Directory. Here are the key highlights: 1?? DCSync…

  • My notes on solving 'Return' from Hack The Box.

    My notes on solving 'Return' from Hack The Box.

    > The machine Key Concepts: Windows Remote Management (WinRM), SMB (Server Message Block), Enumeration, Printer Admin…

  • Creating a basic bash script

    Creating a basic bash script

    I'll show you how to create your first Bash script to perform a small fuzzing operation with the goal of gaining access…

  • Linux `find` Command

    Linux `find` Command

    ███████████████████████████████ ███ Linux `find` Command ███…

  • Cross-site WebSocket hijacking (CSWSH) | RC4 encryption

    Cross-site WebSocket hijacking (CSWSH) | RC4 encryption

    ?? Cybersecurity Journey Update: Inkplot Challenge Completed on HackMyVM! ?? Watch the video here: Link to Video I took…

  • Dominating 3 Buffer Overflows on a Single Machine

    Dominating 3 Buffer Overflows on a Single Machine

    During my journey, I encountered a host of vulnerabilities, including local file inclusion, log poisoning, and the…

社区洞察

其他会员也浏览了