13,627 views
⛔️ This video is for educational purposes only. I do not encourage you to reproduce the techniques presented in the video on a system for which you do not have written permission from the owner. ⛔️ Useful resources: ------------------------------------------------------------------------------------------------------------ ➡️ Active Directory exploitation via As-Rep ROASTING • Active Directory exploitation via As-... ➡️Active Directory exploitation via Kerberoasting • PENTEST under Active Directory ➡️How to use Responder https://www.kalilinux.fr/commandes/re... ➡️Understanding LLMNR poisoning and how to protect yourself from it https://tcm-sec.com/llmnr-poisoning-a... Support the channel ------------------------------------------------------------------------------------------------------------ ☕Buy me a coffee: https://www.buymeacoffee.com/waked Affiliate links ------------------------------------------------------------------------------------------------------------ ????️Buy a Geekom: https://shrsl.com/4cwuh ????️INE : https://ine.grsm.io/wakedxy ???????? HackTheBox : https://bit.ly/htb_ctf ????HTB Academy : https://bit.ly/htb_academy ????TryHackMe : https://bit.ly/thm_xy Follow me on my networks ------------------------------------------------------------------------------------------------------------ ► Facebook : / wakedxy ► Instagram : / wakedxy ► Twitter : / wakedxy1 ► Discord : / discord ► Github: https://github.com/wakedxy