Zero to Hero: Week 8 - Building an AD Lab, LLMNR Poisoning, and NTLMv2 Cracking with Hashcat
Zero to Hero:
0:00 - Welcome
2:37 - Lesson overview
5:00 - Downloading our ISOs
6:35 - Installing Windows Server 2016 and Windows 10
16:30 - Renaming Windows Server 2016
19:00 - Installing VMWare Tools on Server 2016
21:15 - Finishing Windows 10 install
24:20 - Installing Active Directory Domain Services / Downtime Q&A
39:20 - Creating our first domain user
40:40 - Installing VMWare Tools on Windows 10 / Renaming Windows 10
43:05 - Joining Windows 10 machine to domain
48:30 - Setting up a SMB share
51:30 - LLMNR/NBT-NS poisoning overview
56:00 - Using Responder to capture NTLMv2 hashes
1:07:00…
Watch on YouTube ↗
(saves to browser)
Chapters (44)
Welcome
2:37
Lesson overview
5:00
Downloading our ISOs
6:35
Installing Windows Server 2016 and Windows 10
16:30
Renaming Windows Server 2016
19:00
Installing VMWare Tools on Server 2016
21:15
Finishing Windows 10 install
24:20
Installing Active Directory Domain Services / Downtime Q&A
39:20
Creating our first domain user
40:40
Installing VMWare Tools on Windows 10 / Renaming Windows 10
43:05
Joining Windows 10 machine to domain
48:30
Setting up a SMB share
51:30
LLMNR/NBT-NS poisoning overview
56:00
Using Responder to capture NTLMv2 hashes
1:07:00
Cracking NTLMv2 hashes with Hashcat
1:15:10
LLMNR poisoning defenses
1:18:50
Will you ever do a stream on stack overflows?
1:21:03
What is the success rate of LLMNR?
1:22:10
Problems with turning LLMNR off?
1:23:10
Can you place the mitigation slide back up?
1:23:45
How much should you spend on a password cracking rig?
1:24:45
Cobalt vs Metasploit vs Empire - your favorite?
1:26:00
How do you obfuscate Meterpreter?
1:26:40
Does Veil still work?
1:28:42
host-apd or eap hammer?
1:29:40
Has a customer ever intentionally prevented you from doing your job?
1:30:50
Favorite podcasts?
1:31:30
Do you put exploited users in a report? Worried about their firing?
1:32:50
When is your Many Hats appearance coming out?
1:33:10
HackerOne? Bug bounties?
1:35:40
Are you married?
1:35:50
Bug bounties continued
1:37:50
New unconstrained delegation exploit?
1:39:40
OWA spraying and lockout
1:41:20
Favorite bug bounty?
1:42:44
Ever crashed anything on a test?
1:43:50
Funny pentest stories?
1:47:20
Opinion on the cloud and future pentest demand?
1:49:40
What are you looking for when you hire a pentester?
1:53:18
Is pentesting looked down upon?
1:54:10
I want to be a pentester because it's intense, is that a good reason?
1:55:37
What is the OSCP good for?
1:56:35
Thoughts on practical assessments for job hiring?
1:58:10
SOC or
Playlist
Uploads from The Cyber Mentor · The Cyber Mentor · 36 of 60
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
▶
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
Buffer Overflows Made Easy - Part 1: Introduction
The Cyber Mentor
Buffer Overflows Made Easy - Part 2: Spiking
The Cyber Mentor
Buffer Overflows Made Easy - Part 3: Fuzzing
The Cyber Mentor
Buffer Overflows Made Easy - Part 4: Finding the Offset
The Cyber Mentor
Buffer Overflows Made Easy - Part 5: Overwriting the EIP
The Cyber Mentor
Buffer Overflows Made Easy - Part 6: Finding Bad Characters
The Cyber Mentor
Buffer Overflows Made Easy - Part 7: Finding the Right Module
The Cyber Mentor
Buffer Overflows Made Easy - Part 8: Generating Shellcode and Gaining Shells
The Cyber Mentor
HackTheBox - Sunday Walkthrough (Re-Up)
The Cyber Mentor
Networking for Ethical Hackers - TCP, UDP, and the Three-Way Handshake (Re-Up)
The Cyber Mentor
Networking for Ethical Hackers - Network Subnetting (Re-Up)
The Cyber Mentor
Networking for Ethical Hackers - Network Subnetting Part 2: The Challenge (Re-Up)
The Cyber Mentor
Networking for Ethical Hackers - Building A Basic Network with Cisco Packet Tracer (Re-Up)
The Cyber Mentor
HackTheBox - Fighter Walkthrough (Re-Up)
The Cyber Mentor
Beginner Linux for Ethical Hackers - Navigating the File System
The Cyber Mentor
Beginner Linux for Ethical Hackers - Users and Privileges
The Cyber Mentor
Beginner Linux for Ethical Hackers - Common Network Commands
The Cyber Mentor
Beginner Linux for Ethical Hackers - Viewing, Creating, and Editing Files
The Cyber Mentor
Beginner Linux for Ethical Hackers - Controlling Kali Services
The Cyber Mentor
Beginner Linux for Ethical Hackers - Scripting with Bash
The Cyber Mentor
Beginner Linux for Ethical Hackers - Installing and Updating Tools
The Cyber Mentor
Cracking Linux Password Hashes with Hashcat
The Cyber Mentor
Reminder: Twitch Hacking Live Stream Tonight! 2/26/19 at 8PM EST
The Cyber Mentor
Hacking Live Stream: Episode 1 - Kioptrix Level 1, HackTheBox Jerry, and Career Q&A / AMA
The Cyber Mentor
Hacking Live Stream: Episode 2 - HackTheBox Active, Vulnserver Buffer Overflow, and Career Q&A / AMA
The Cyber Mentor
Hacking Live Stream: Episode 3 - Hack The Box Blue, Devel, and Career Q&A / AMA
The Cyber Mentor
New Zero to Hero Pentest Course, New Website, and 2K Subs?!
The Cyber Mentor
Zero to Hero Pentesting: Episode 1 - Course Introduction, Notekeeping, Introductory Linux, and AMA
The Cyber Mentor
Zero to Hero Pentesting: Episode 2 - Python 101
The Cyber Mentor
Zero to Hero Pentesting: Episode 3 - Python 102, Building a Terrible Port Scanner, and a Giveaway
The Cyber Mentor
Zero to Hero Pentesting: Episode 4 - Five Phases of Hacking + Passive OSINT
The Cyber Mentor
Zero to Hero Pentesting: Episode 5 - Scanning Tools (Nmap, Nessus, BurpSuite, etc.) & Tactics
The Cyber Mentor
Zero to Hero Pentesting: Episode 6 - Enumeration (Kioptrix & Hack The Box)
The Cyber Mentor
Zero to Hero Pentesting: Episode 7 - Exploitation, Shells, and Some Credential Stuffing
The Cyber Mentor
Installing Windows Server 2016 on VMWare in 5 Minutes
The Cyber Mentor
Zero to Hero: Week 8 - Building an AD Lab, LLMNR Poisoning, and NTLMv2 Cracking with Hashcat
The Cyber Mentor
A Day in the Life of an Ethical Hacker / Penetration Tester
The Cyber Mentor
Active Directory Exploitation - LLMNR/NBT-NS Poisoning
The Cyber Mentor
Zero to Hero: Week 9 - NTLM Relay, Token Impersonation, Pass the Hash, PsExec, and more
The Cyber Mentor
Zero to Hero: Episode 10 - MS17-010/EternalBlue, GPP/cPasswords, and Kerberoasting
The Cyber Mentor
Writing a Pentest Report
The Cyber Mentor
Zero to Hero: Week 11 - File Transfers, Pivoting, and Reporting Writing
The Cyber Mentor
The Complete Linux for Ethical Hackers Course for 2019
The Cyber Mentor
Full Ethical Hacking Course - Beginner Network Penetration Testing (2019)
The Cyber Mentor
Popping a Shell with SMB Relay and Empire
The Cyber Mentor
Pentesting for n00bs: Episode 1 - Legacy (hackthebox)
The Cyber Mentor
Pentesting for n00bs: Episode 2 - Lame
The Cyber Mentor
Pentesting for n00bs: Episode 3 - Blue
The Cyber Mentor
Web App Testing: Episode 1 - Enumeration
The Cyber Mentor
Pentesting for n00bs: Episode 4 - Devel
The Cyber Mentor
Pentesting for n00bs: Episode 5 - Jerry
The Cyber Mentor
Web App Testing: Episode 2 - Enumeration, XSS, and UI Bypassing
The Cyber Mentor
Pentesting for n00bs: Episode 6 - Nibbles
The Cyber Mentor
Web App Testing: Episode 3 - XSS, SQL Injection, and Broken Access Control
The Cyber Mentor
How NOT to Approach a Cybersecurity Mentor
The Cyber Mentor
Web App Testing: Episode 4 - XXE, Input Validation, Broken Access Control, and More XSS
The Cyber Mentor
Pentesting for n00bs: Episode 7 - Optimum (hackthebox)
The Cyber Mentor
Pentesting for n00bs: Episode 8 - Bashed (hackthebox)
The Cyber Mentor
Pentesting for n00bs: Episode 9 - Grandpa
The Cyber Mentor
Top 5 Internal Pentesting Methods
The Cyber Mentor
DeepCamp AI