AD Attack: Part 3

1 year ago
7

Part 3 will follow me through the post-exploitation process. Starting with NetExec and following up with Evil-WinRM to gain our initial foothold into the Active Directory set.

Disclaimer: This Active Directory being attacked is a virtual environment and belongs to me as the owner of this system. All software utilized is open source or paid for in full. This video was not created for anything but education geared towards the Information Security community and should not be utilized illegally.

Thanks.

Loading comments...