After getting initial access to a domain, your job is to escalate privileges to get admin-level access. In this course, you will learn how to use Rubeus to perform two well-known privilege escalation attacks: Kerberoasting and AS-REP Roasting.
One of your main objectives in a red team engagement is getting admin-level access to the domain. Escalating your privileges through vulnerability exploitation is usually difficult in highly-patched environments. In this course, Privilege Escalation with Rubeus, we will explore how to get admin credentials using two well-known attacks against active directory domains: Kerberoasting and AS-REP Roasting. First, you will learn how to harvest hashed credentials using Rubeus to execute a Kerberoasting attack. Then, you will see how to harvest even more hashed credentials using the AS-REP technique. Finally, you will explore how to crack those hashed passwords using Hashcat. This course covers three important tactics from the Mitre Att&ck framework: Access Token Manipulation (T1134), Kerberoasting (T1558.003) and AS-REP Roasting (T1558.004).
Ricardo is a Cybersecurity Consultant based in Toronto (Canada). He has 10+ years of IT experience, 6 of them in the IT Security field. His main interests are: SIEM solutions (IBM QRadar), Enterprise Security Risk, Penetration Testing, Security processes/procedures and Network Security.
Course Overview (Tool Introduction) Hey there. Welcome to the course Privilege Escalation with Rubeus. In this cybersecurity tools course, you'll learn how to get admin‑level privilege to a domain using Rubeus. Imagine that you're working on a red team engagement. After getting initial access to a domain, your job is to escalate privileges to get admin‑level access, and one of the main ways of doing that is by exploiting vulnerabilities in the Kerberos system of a domain. In this course, we'll cover the Rubeus tool, which will allow you to perform some of the most well‑known privilege escalation attacks such as Kerberoasting and AS‑REP Roasting. We start this course by discussing how you can leverage Active Directory attacks to gain privileged access. Then, in our first demo, you'll learn how to execute a Kerberoasting attack using Rubeus. And after that, in our second demo, you'll learn how to execute an AS‑REP Roasting attack, which is perfect to harvest hash credentials. And then finally, you'll learn how to crack those hash credentials to get plain text credentials. So, whether you're trying to get admin‑level access on a red team engagement or just testing the Kerberos system of your own company, join me in learning how to escalate privileges with Rubeus here at Pluralsight.