Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Light Pentest LITE (Live Interactive Training Experience) - v2
Light Pentest LITE (v2): Getting Started
Welcome and getting started!
Light Pentest LITE: Day 1
Welcome!
Intros and housekeeping
Review scope and rules of engagement
Tour of your student VM
Where are we on the network?
DNS zone transfers
Active Directory nickel tour
Active Directory dumpster diving
Network share enumeration
Kerberoasting
ASREPRoasting
Cracking hashes: part 1
Unquoted service paths
Test Windows Defender's temper
Bypass AMSI
Privesc with PowerSploit
Day 1: pwned!
Light Pentest LITE: Day 2
Welcome to day 2!
Cracking hashes: part 2
Sniping cleartext creds from GPOs
Password spraying attacks prep
CrackMapExec: validating domain credentials
CrackMapExec: validating local credentials
Password spraying with Rubeus
Capturing credentials with Inveigh
BloodHound: setting up Neo4j
SharpHound: data collection
BloodHound: importing data
BloodHound: mapping attack paths
Exploiting Group Policy Objects
Day 2: Pwned!
Light Pentest LITE: Day 3
Welcome to day 3!
Dumping and cracking Active Directory hashes
Pass-the-hash attacks
Setting credential "traps" with CrackMapExec
Stealing passwords with mimikatz
Abusing SQL services
Relaying hashes from SQL
You own Tangent Town!
Closing thoughts/questions/miscellany
Special thank you!
Where are we on the network?
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock