AD Basics & Stack based Buffer Overflow (JB & Mystiko DuoStream #1)

AD Basics & Stack based Buffer Overflow (JB & Mystiko  DuoStream #1) {Celebrity |Famous |}%title%{ Net Worth| Wealth| Profile}
YouTube Excerpt: In this first duostream, Mystiko and I will tackle 2 different topics. We start with a bit of background, enumeration and exploitation of an Active Directory environment. Here we cover topics such as LDAP, Kerberos, AS-REP ROAST, Bloodhound, and Pass-the-Hash. Next, we'll look at the stack-based buffer overflow. We'll see how we can test the binary, manipulate the stack, use a buffer to write shellcode to, and finally run the shell code. Be sure to check the channels below for even more InfoSec info! #Jarno ♾️ Discord: https://discord.com/invite/Rw6bcKj 🌎 Site: https://jarnobaselier.nl #Mystiko ▢️ Twitch: https://www.twitch.tv/cyber_v1s3rion 🌎 CTF Site: https://ctf-mystiko.com/ Learned something and want to support me, please buy me a nice cup of coffee ;-) β˜• https://www.buymeacoffee.com/jarno CHAPTERS 00:00 – Intro 02:06 – Active Directory Intro 05:00 – Starting Sauna HTB Machine 06:10 – Nmap scanning 07:50 – Enumerating the website 11:35 – Doing a Ffuf Dirscan 14:20 – Enumerating SMB 15:10 – Enumerating DNS 18:20 – Enumerating LDAP 27:00 – Enumerating users with Kerberos 32:20 – AS-REP Roasting and cracking the hash 47:00 – Enumerating SMB with CrackMapExec and SMBeagle 53:10 – Logging in as a user - user flag 56:00 – Basic Windows Enumerating with WinPEAS and finding AutoLogon creds 01:07:00 – Logging in as the second user 01:08:00 – Running Sharphound to get AD information and structure 01:13:50 – Logging in as a user - user flag 01:20:00 – Running a DCSync with Secretsdump and cracking it (not possible) 01:25:00 – Pass the hash and logging in as an Administrator (root flag) 01:27:45 – Starting of Stack Based Buffer Overflow 01:27:45 – Crashing the application 01:27:45 – Starting of Stack Based Buffer Overflow 01:30:00 – Controlling the EIP 01:34:50 – Finding OPCodes (JMP ESP) 01:51:00 – Adding NOP's and explaining INT3 01:57:00 – Finding bad characters 02:03:00 – Creating shellcode and gaining reverse shell

In this first duostream, Mystiko and I will tackle 2 different topics. We start with a bit of background, enumeration and exploitation of an Active...

Read Full Article πŸ”

Curious about AD Basics & Stack Based Buffer Overflow (JB & Mystiko DuoStream #1)'s Color? Explore detailed estimates, salary breakdowns, and financial insights that reveal the true scope of their profile.

color style guide

Source ID: 8chi09aEMsY

Category: color style guide

View Color Profile πŸ”“

Disclaimer: %niche_term% estimates are based on publicly available data, media reports, and financial analysis. Actual numbers may vary.

Sponsored
Sponsored
Sponsored