Windows Red Team Credential Access Techniques | Red Team Series 6-13

Subscribers:
1,040,000
Published on ● Video Link: https://www.youtube.com/watch?v=JX8UvwPzw08



Category:
Guide
Duration: 40:35
1,220 views
26


This guide is part of the HackerSploit Red Team series of guides. Credential Access consists of techniques for stealing credentials like account names and passwords. Techniques used to get credentials include: keylogging or credential dumping. Using legitimate credentials can give adversaries access to systems, make them harder to detect, and provide the opportunity to create more accounts to help achieve their goals.

Chapters:
0:00 Introduction
0:30 What We’ll Be Covering
0:56 What is Credential Access?
1:57 Mitre Attack Techniques - Credential Access
2:39 Let’s Get Started
2:54 What is mimikatz?
3:52 Using mimikatz with our High Integrity Agent
6:30 Are There Any Login Passwords in Memory?
7:55 Using lsadump
9:20 Using the meterprater
14:46 Preparing the mimikatz Binaries
16:40 Dumping the Login Passwords
19:12 Using hash dump
19:30 Loading mimikatz with load_kiwi
19:49 Using the lsa_dump_sam and lsa_dump_secrets Command
21:07 Results from the Powershell Agent
21:57 Using the mimikatz-cache Module
22:24 Locating Our unattended.xml File
24:25 Uploading the Binary to the Target
26:54 Listing Login Sessions
28:54 Our Second Windows Target
29:21 Running mimikatz Modules using Starkiller
30:12 Listing Tokens We Can Impersonate
30:42 Uploading mimikatz
31:33 Using logonpasswords
32:46 Using lsadump::sam
33:15 Using sekursla::logonpasswords
34:14 Using the Windows Credentials Editor
36:46 Using hashdump
37:50 Using johntheripper
39:50 Conclusion

New to Linode? Get started here with a $100 credit → https://www.linode.com/linodetube
Read the doc for more information on Credential Access → https://www.linode.com/docs/guides/windows-red-team-credential-access-with-mimikatz/
Learn more about Hackersploit https://www.linode.com/docs/guides/hackersploit-red-team-series/
Subscribe to get notified of new episodes as they come out → https://www.youtube.com/linode?sub_confirmation=1

#Linode #Security #RedTeam #Hackersploit
Product: Linode, Security, Red Team; @HackerSploit ;




Other Videos By Akamai Developer


2022-05-04These 3 tools will change the way you transfer files between your Linode and local machine.
2022-05-02Linux Privilege Escalation Techniques | Red Team Series 9-13
2022-04-29How MSPs use Open Source Solutions on Linode | 2022 Channel Partners Expo
2022-04-27Deploying a Django App to Linode | Jose Portilla Full Course Available
2022-04-25Windows Privilege Escalation Techniques | Red Team Series 8-13
2022-04-22Take Control of AND Secure Your Passwords Using Vaultwarden on Portainer
2022-04-20Saltcorn | An Open Source, No-Code, Database Application Builder
2022-04-18Windows Defense Evasion Techniques | Red Team Series 7-13
2022-04-15Homer Server Dashboard | Visualize Your Containers and Services Simply and Easily
2022-04-13MySQL for Beginners Part 2 | Working With Data
2022-04-11Windows Red Team Credential Access Techniques | Red Team Series 6-13
2022-04-08High Availability Explained | How to Upgrade to High Availability with Linode Kubernetes Engine
2022-04-06Intro to MySQL For Beginners Part 1 | Common Commands
2022-04-05Running a basic Ansible Playbook installing Nginx #shorts
2022-04-04Windows Red Team Persistence Techniques | Red Team Series 5-13
2022-04-01RocketChat | Fast, Secure, Open Source Communication
2022-03-30Managing Your Own Databases is a Task of the Past with Linode's Managed Database Platform
2022-03-28Linux Red Team Exploitation Techniques | Red Team Series 4-13
2022-03-25Installing TensorFlow on an Ubuntu Server
2022-03-23Speed Up Your SSH Sessions with These Seven Quick SSH Config Tricks
2022-03-21Windows Red Team Exploitation Techniques | Red Team Series 3-13



Tags:
linode
linux
cloud computing
alternative cloud
linux server
open source
sysadmin
red team
red teaming
cyber security
ethical hacking
penetration testing
cyber security training
what is a red team
red team vs blue team
information security
hacker exploit
kali linux
cyber security course
cyber security training for beginners
cyber security full course
red team versus blue team
red team review
red team blue team
information security tutorial