CONDA is the best infosec KZbinr of all time. Respect bro!!
@c0nd43 жыл бұрын
Thanks so much!
@Xx-nd1rs Жыл бұрын
I like the way you explain things, very simple, clear, informative, organized and get to the point. thanks a loot!
@c0nd4 Жыл бұрын
Thank you!
@ElCyberWizard2 жыл бұрын
I’ve been working on my GPEN cert and your content has been very helpful with tying everything together at the end of each section!
@x7331x9 ай бұрын
Great on-point explanation of the attack 👏
@harshil.3 жыл бұрын
Great video bro definitely enjoyed it the whole way through. I'm sure this video will get a bunch of traction now that AD is on the OSCP lmao
@c0nd43 жыл бұрын
I appreciate it!
@morality19953 жыл бұрын
I'm literally watching this video prepping to take the new OSCP exam lol
@Stephanus21 Жыл бұрын
Thank you , just started to watch your stuff and you do an amazing job of showing and explaining exactly how it works , thank you so much!
@c0nd4 Жыл бұрын
Thank you!
@csheldon3636 Жыл бұрын
Excellent video. A lot easier than the OSCP explanation.
@randomguy37843 жыл бұрын
Neat and Comprehensive presentation! Great work man.
@c0nd43 жыл бұрын
Thank you!
@dawnS33ker2 жыл бұрын
Very clear and concise video. Thank you Brandon,
@aahringer Жыл бұрын
Thanks!
@c0nd4 Жыл бұрын
Thank you so much! Very kind of you!
@crash97063 жыл бұрын
Yesss more AD. Love the content. Keep it up ❤️
@c0nd43 жыл бұрын
Thanks! I appreciate it
@heibai0139 Жыл бұрын
Great video, much helper than OSCP 23' course materials, appreciate
@offlife773 жыл бұрын
Awesome mate, keep them coming!
@chrislearnsIT2 жыл бұрын
Thanks for the high quality content! I just subscribed.
@c0nd42 жыл бұрын
Thank you!
@Eggsec2 жыл бұрын
Thank you for the valuable information much appreciated.
@quentingauthier4303 жыл бұрын
Dude, you make awesome videos
@c0nd43 жыл бұрын
Thank you! I really appreciate the support
@jcgm6663 жыл бұрын
Very good explanation! Subscribed
@c0nd43 жыл бұрын
Thank you!
@teedeearr Жыл бұрын
I found this very informative. Thanks
@adamraserovaquera11 ай бұрын
11:18 A question here, how can yo know that what etype you are searching for is the TGS-REP 23 and not lets say... the TGS-REP 18 that its at its side?
@ca79863 жыл бұрын
You are awesome mate! Gold videos. ❤️
@c0nd43 жыл бұрын
Thank you! Really appreciate it
@real.xplo1t3 жыл бұрын
Perfect explanation
@c0nd43 жыл бұрын
Thank you!
@jaylal48993 жыл бұрын
Very good video! It's much easier to understand kerberoasting with a practical example. Any chance you can make a video on how to compile windows kernel exploits using Visual Studio?
@DanEather3 жыл бұрын
Great vid. Clearly presented. Thanks!
@quad7375 Жыл бұрын
can you go over more AD attacks, golden ticket, silver, dc sync, etc
@vikassrivastava20582 жыл бұрын
Great content
@enleak3 жыл бұрын
Lets goo!
@aahringer Жыл бұрын
Well done! Thank you!
@underrated_mono9770 Жыл бұрын
If hostname of the SPN "DC-1" is replaced with another hostname, does it affect the Kerberoasting operation here?
@GodlyTank Жыл бұрын
Thanks a bunch for this
@danielriofrio1992 жыл бұрын
Hey! I was wondering if you could explain something to me please: Per MITRE ATTACK definition of kerberoasting: "Portions of these tickets may be encrypted with the RC4 algorithm, meaning the Kerberos 5 TGS-REP etype 23 hash of the service account associated with the SPN is used as the private key and is thus vulnerable to offline Brute Force attacks that may expose plaintext credentials." This will result in windows log eid 4769 with encryption type 0x17. Is this the only time that this is dangerous? Only if this type of encryption was used? Working on a SIEM alarm to detect potential malicious kerberoasting :)
@matiashuartamendia7977 Жыл бұрын
is it really NTLM hash inside the service account? I think that RC4 etype encrpytion of that password is equal to NTLM Hash, but AES-128 or AES-256 is completely different. Hashcat would take a LOT of time to decrypt it if password is strong enough.
@shermanlaw5223Ай бұрын
How come you used John account and not the new sql account you created?
@Umar0x013 жыл бұрын
Best!!!
@eanglyroeurn82553 жыл бұрын
Bro Please help to create more video relate to AD attack, I knew that me and someone here will need that resource for OSCP fighting.
@DinoDulayAwil3 жыл бұрын
Does the tool execution leave some footprint on the server for detection?
@DinoDulayAwil3 жыл бұрын
I understand it requires a compromised account (normal account will do), can we use other abuse technique that does not require one? A different vector somehow. Thanks.
@c0nd43 жыл бұрын
The most common way I've seen this vector detected is from SPN enumeration. If you made a request to list all SPNs, some EDR programs may catch it.
@ajayk6433 жыл бұрын
Subscribed :) :)
@giovanniguarino5883 жыл бұрын
Thank you for your explaination, but this is a very little part of kerberoasting.
@redreacts2388 Жыл бұрын
I'm taking a course right now that I paid for, but this was a far better explanation on how to exploit this vulnerability.....smh