BEGIN:VCALENDAR
PRODID:-//vBulletin 6//EN
VERSION:2.0
CALSCALE:GREGORIAN
BEGIN:VEVENT
UID:832029c8-69db-4a1f-8037-d42fb0cf42ca
DTSTAMP:20260419T014842Z
SUMMARY:Bad Active Directory (BAD)
DESCRIPTION:This is an introductory to intermediate level Windows active di
 rectory (AD) training. The training has two parts: a lecture component\, w
 here we'll cover how active directory works and the core things you need t
 o know to attack it effectively\, and a series of hands-on labs modeled af
 ter real attacks we've performed on client environments. The training will
  be heavily lab focused\, with each student receiving their own AWS enviro
 nment to play with. The labs are based off of how real modern networks loo
 k\, not example test environments\, and successfully completing each lab i
 nvolves chaining together multiple vulnerabilities in a realistic kill cha
 in methodology to get domain admin.\n\nSpeaker(s): Dhruv Verma\, Michael R
 oberts\, Xiang Wen Kuan\n\nLocation: Packet Hacking Vlg\n\nDiscord: https:
 //discord.com/channels/708208267699945503/708242376883306526\n\nEvent star
 ts: 2020-08-09 09:00 (09:00 AM) PDT (UTC -07:00)\n\nEvent ends: 2020-08-09
  13:00 (01:00 PM) PDT (UTC -07:00)\n\nFor the most up-to-date information\
 , please either visit https://info.defcon.org\, or use HackerTracker\, whi
 ch is available for iOS and Android. This is an automated message\, and th
 is data was last modified 2020-07-29T01:18 (UTC).
URL:https://forum.defcon.org/node/234263
DTSTART:20200809T170000Z
DTEND:20200809T210001Z
LOCATION:Packet Hacking Vlg
END:VEVENT
END:VCALENDAR
