This is an introductory to intermediate level Windows active directory (AD) training. The training has two parts: a lecture component, where we'll cover how active directory works and the core things you need to know to attack it effectively, and a series of hands-on labs modeled after real attacks we've performed on client environments. The training will be heavily lab focused, with each student receiving their own AWS environment to play with. The labs are based off of how real modern networks look, not example test environments, and successfully completing each lab involves chaining together multiple vulnerabilities in a realistic kill chain methodology to get domain admin.
Speaker(s): Dhruv Verma, Michael Roberts, Xiang Wen Kuan
Location: Packet Hacking Vlg
Discord: https://discord.com/channels/7082082...42376883306526
Event starts: 2020-08-09 09:00 (09:00 AM) PDT (UTC -07:00)
Event ends: 2020-08-09 13:00 (01:00 PM) PDT (UTC -07:00)
For the most up-to-date information, please either visit https://info.defcon.org, or use HackerTracker, which is available for iOS and Android. This is an automated message, and this data was last modified 2020-07-29T01:18 (UTC).
Speaker(s): Dhruv Verma, Michael Roberts, Xiang Wen Kuan
Location: Packet Hacking Vlg
Discord: https://discord.com/channels/7082082...42376883306526
Event starts: 2020-08-09 09:00 (09:00 AM) PDT (UTC -07:00)
Event ends: 2020-08-09 13:00 (01:00 PM) PDT (UTC -07:00)
For the most up-to-date information, please either visit https://info.defcon.org, or use HackerTracker, which is available for iOS and Android. This is an automated message, and this data was last modified 2020-07-29T01:18 (UTC).
