Discovery with ADRecon

In this course, we cover the ADRecon tool, which allows you to extract valuable information from the Active Directory, including users, security groups, computers, security policies, and even Kerberos tickets.
Course info
Level
Intermediate
Updated
Apr 23, 2020
Duration
22m
Table of contents
Description
Course info
Level
Intermediate
Updated
Apr 23, 2020
Duration
22m
Description

The Active Directory of a company is a valuable source of information for a red team specialist. In there, you can find information about the users, computers, and even security policies. In this course, Discovery with ADRecon, you will learn about ADRecon, developed by Prashant Mahajan, which enables red team specialists to generate interesting reports from the Active Directory of a target company. First, you will discover the importance of the Active Directory data in a red team engagement and how this data can help you in further attacks. Then, you will see how to use ADRecon tool to extract data from your client’s Active Directory and generate a complete report about the environment. Finally, you will explore how to perform a Kerberoast attack using the ADRecon tool, in which you will gather hashed credentials from the Active Directory and crack them using Hashcat. When you are finished with this course, you will have the skills and knowledge to extract valuable information from the AD and plan your next attacks. This course covers five important tactics from the Mitre Att&ck Framework: Password Policy Discovery (T1201), Permission Groups Discovery (T1069), Account Discovery (T1087), Data from Information Repositories (T1213) and Kerberoasting (T1208).

About the author
About the author

Ricardo is a Cybersecurity Consultant based in Toronto (Canada). He has 10+ years of IT experience, 6 of them in the IT Security field. His main interests are: SIEM solutions (IBM QRadar), Enterprise Security Risk, Penetration Testing, Security processes/procedures and Network Security.

More from the author
Collection with PowerUpSQL
Intermediate
26m
Jul 14, 2020
Collection with PowerSploit
Intermediate
28m
May 29, 2020
More courses by Ricardo Reimao
Section Introduction Transcripts
Section Introduction Transcripts

Course Overview
[Autogenerated] Hey there. Welcome to Parasite in the cyber. Security to scores, you learn how to discover information from activity. Right tree using the eydie record, too, in the Red Team engagement. After getting Mitchell access to machine, one of her main objectives is to gather information about the environment so it can move laterally. Escalate your privileges. The A D Rick wantto helps you to extract a lot of valuable information from the active directory. So then you can plan and execute your next attacks. So whether you're trying to escalate your privileges and that red team engagement or just planning to out is your own activity directory, join me in learning how to gather information from active directories using the Eydie record to hear a parasite.