In Part 1 we simply conduct our initial scan against the target Active Directory foothold machine and discuss the results.
Пікірлер: 15
@elilanz5 ай бұрын
I love this, looking forward to your next videos. cheers!
@AuroraSec5 ай бұрын
Thank you, much appreciated. I will be releasing Part 2 this evening which focuses on the process of using CrackMapExec to gain the initial foothold.
@elilanz5 ай бұрын
@@AuroraSec that's super, turned the notification bell , I'll get an alert when you release it
@elilanz5 ай бұрын
@@AuroraSec I thought the initial foothold is on MS01 , then Crackmapexec will valid creds for internal MS02
@jsanchez1980Ай бұрын
Thanks for the video! Also, the recording volume was a little low. I had to turn my speakers all the way up.
@user-bc4gp4nr5v4 ай бұрын
stay consistent bro
@mikesmith-zc6ic5 ай бұрын
Great content man. Wanted to ask if you felt the Oscp training course/labs was enough to pass the exam?
@AuroraSec5 ай бұрын
Thats a great question, so part of me wants to say yes, but the other part knows that I did a shit ton of HTB and Offsec Practice before signing up for the course / labs. I never came close to completing the course work, but thats because I really just love executing and figuring shit out.
@AuroraSec5 ай бұрын
On the below note, I absolutely couldn't have passed the exam without the OffSec Labs. They were paramount for me in understanding methodology and the Active Directory.
@mikesmith-zc6ic5 ай бұрын
Haha nice. Kind of what I’m doing as well. Using the offsec course work a supplementing with HTB. Thanks for the quick response.
@AuroraSec5 ай бұрын
@@mikesmith-zc6ic Absolutely, also make SURE you get into the Discord server because there are some scary smart individuals willing to help. Some are less willing lol, but I still hang out on their Discord to help others.