What's new
Warez.Ge

This is a sample guest message. Register a free account today to become a member! Once signed in, you'll be able to participate on this site by adding your own topics and posts, as well as connect with other members through your own private inbox!

Pluralsight - Active Directory Privilege Escalation and Lateral Movement

voska89

Moderator
Staff member
Top Poster Of Month
897213f66931920ace9b8fa16ee40b8d.webp

Free Download Pluralsight - Active Directory Privilege Escalation and Lateral Movement
Released 3/2025
By Ricardo Reimao
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Level: Intermediate | Genre: eLearning | Language: English + subtitle | Duration: 40m 31s | Size: 111 MB​

The Active Directory is an excellent exploitation point for privilege escalation and lateral movement. This course will teach you to exploit an Active Directory environment and gain domain administrator privileges.
One of the main targets for advanced threats is the Active Directory (AD) environment since it is responsible for authentication and authorization in a domain. If misconfigured, the AD could allow an attacker to obtain domain administrator privileges and move laterally on the environment. In this course, Active Directory Privilege Escalation and Lateral Movement, you'll learn to discover and exploit vulnerabilities that allow moving laterally and escalating privileges. First, you'll explore how to gain access to other accounts in the domain and impersonate users. Next, you'll discover how to exploit weak Access Control Lists (ACLs) to obtain domain admin privileges. Finally, you'll learn how to dump the hashed passwords of every user in the domain so you can access any server you want. When you're finished with this course, you'll have the skills and knowledge of AD exploitation needed to escalate privileges and move laterally.
Homepage:
Code:
https://www.pluralsight.com/courses/ad-priv-escalation-lateral-movement

Recommend Download Link Hight Speed | Please Say Thanks Keep Topic Live
No Password - Links are Interchangeable
 

Users who are viewing this thread

Back
Top