- 21
- 49 101
ATTL4S
Spain
เข้าร่วมเมื่อ 1 พ.ย. 2018
attl4s.github.io/
3 - [English] Understanding a Payload's Life - Payload Executables
The aim of this presentation is understanding the life of a Meterpreter payload - from its generation to its execution. How all the pieces fit together. This knowledge will be handy not only for MSF and Meterpreter… but for almost any popular C2 framework
มุมมอง: 319
วีดีโอ
2 - [English] Understanding a Payload's Life - Payload Generation
มุมมอง 446ปีที่แล้ว
The aim of this presentation is understanding the life of a Meterpreter payload - from its generation to its execution. How all the pieces fit together. This knowledge will be handy not only for MSF and Meterpreter… but for almost any popular C2 framework
1 - [English] Understanding a Payload's Life - Introduction
มุมมอง 1Kปีที่แล้ว
The aim of this presentation is understanding the life of a Meterpreter payload - from its generation to its execution. How all the pieces fit together. This knowledge will be handy not only for MSF and Meterpreter… but for almost any popular C2 framework
3 - [English] Understanding Windows Lateral Movements - Hashes, Tickets and the SSPI
มุมมอง 726ปีที่แล้ว
The aim of this presentation is understanding the art of user impersonation in Windows systems. This knowledge will be handy when performing lateral movements and other interesting attacks within Windows and Active Directory networks
2 - [English] Understanding Windows Lateral Movements - Access Token Manipulation & Passwords
มุมมอง 866ปีที่แล้ว
The aim of this presentation is understanding the art of user impersonation in Windows systems. This knowledge will be handy when performing lateral movements and other interesting attacks within Windows and Active Directory networks
1 - [English] Understanding Windows Lateral Movements - Windows Authentication
มุมมอง 2.6Kปีที่แล้ว
The aim of this presentation is understanding the art of user impersonation in Windows systems. This knowledge will be handy when performing lateral movements and other interesting attacks within Windows and Active Directory networks
3 - [English] You Do (Not) Understand Kerberos Delegation - Constrained Delegation
มุมมอง 4.8K3 ปีที่แล้ว
3 - [English] You Do (Not) Understand Kerberos Delegation - Constrained Delegation
4 - [English] You Do (Not) Understand Kerberos Delegation - RBCD
มุมมอง 2.7K3 ปีที่แล้ว
4 - [English] You Do (Not) Understand Kerberos Delegation - RBCD
2 - [English] You Do (Not) Understand Kerberos Delegation - Unconstrained Delegation
มุมมอง 4.3K3 ปีที่แล้ว
2 - [English] You Do (Not) Understand Kerberos Delegation - Unconstrained Delegation
1 - [English] You Do (Not) Understand Kerberos Delegation - Introduction
มุมมอง 7K3 ปีที่แล้ว
1 - [English] You Do (Not) Understand Kerberos Delegation - Introduction
4 - [Spanish] You Do (Not) Understand Kerberos Delegation - RBCD
มุมมอง 5213 ปีที่แล้ว
4 - [Spanish] You Do (Not) Understand Kerberos Delegation - RBCD
3 - [Spanish] You Do (Not) Understand Kerberos Delegation - Constrained Delegation
มุมมอง 6713 ปีที่แล้ว
3 - [Spanish] You Do (Not) Understand Kerberos Delegation - Constrained Delegation
2 - [Spanish] You Do (Not) Understand Kerberos Delegation - Unconstrained Delegation
มุมมอง 8423 ปีที่แล้ว
2 - [Spanish] You Do (Not) Understand Kerberos Delegation - Unconstrained Delegation
1 - [Spanish] You Do (Not) Understand Kerberos Delegation - Introducción
มุมมอง 1.4K3 ปีที่แล้ว
1 - [Spanish] You Do (Not) Understand Kerberos Delegation - Introducción
[English] You Do (Not) Understand Kerberos
มุมมอง 7K3 ปีที่แล้ว
Understanding how Kerberos works, but also WHY it works the way it does
[Spanish] Understanding Windows Lateral Movements
มุมมอง 3.5K5 ปีที่แล้ว
[Spanish] Understanding Windows Lateral Movements
AMSI Bypass - Zc00l & RastaMouse techniques
มุมมอง 1.9K6 ปีที่แล้ว
AMSI Bypass - Zc00l & RastaMouse techniques
Invisi-Shell - Bypassing all Powershell security features
มุมมอง 1.1K6 ปีที่แล้ว
Invisi-Shell - Bypassing all Powershell security features
Es oro este video! Pensaba que conocia bien este tipo de ataques pero gracias a Attl4s he aprendido aun mas sobre ello
Excellent, appreciate all your efforts. Please provide more videos and it is supportive for learning. Kerberos is a tricky topic but you have explained it nicely. Thank you.
Muy buena explicacion! ;)
Great explanation bro, thank you a lot.
Thank you so much for creating this amazing content! This is by far the best explantion of these topics I have found so far.
lo que me ha costado encontrar un video bueno de las delegaciones de kereberos en español
nice bro!!!
nice
nice bro !!!!
nice!!!
I never actually understood windows contexts and tokens until watching these videos. It's crazy having access to all this for free
Excellent video series! Now I feel a whole lot more knowledgeable on Kerberos and delegation involving it, and I was able to understand all the attacks before you even finished explaining them. Thank you!
Thanks so much for making this!
These videos were pure gold for understanding kerberos delegation, much appreciated
Very great tutorial! Thank you very much for your work! 😋 And I followed the same configuration with the slides, but I didn't get the same result which "forwardable" flag of the ticket was setting in TGS-REP in RBCD section on page 189. I have checked my Web01 is "Do not trust this computer for delegation". Are there any other options need to be set? 🥲
Please never take this series off TH-cam. It’s the absolute best way to learn about Kerberos delegation. Thank you so much!
Thanks sir 💟💟
Perfect !!
Amazing series! Your english is great, I don't know why you think otherwise 🤔!
Timestamp. Hope this helps 0:00 Intro 2:03 Disclaimer 2:24 Agenda 2:50 Project Athena . Massachusetts Institute of Technology (MIT) 5:37 Kerberos Versions 6:40 Kerberos v5 Additions 7:14 Microsoft and Kerberos - Kerberos vs was introduced in Windows Server 2000 8:29 The Problem 16:04 How (not) to use a Service 18:09 How to use a Service 22:56 Single Sign-On (SSO) 25:45 Improvements • The Authentication Server (AS) allows centralising secret keys 26:52 Tickets 31:54 Authenticators (cont.) - Authenticators are created and encrypted by the client with session keys 41:37 Kerberos in Active Directory • All Kerberos actors need to have the time synchronized to a central time source Lotherwise ticket expirations and timestamps... 44:08 CAPSULE.CORP 47:18 service PrincipalName (SPN) 50:13 Kerberos Messages 53:59 AS-REQ 55:12 AS-REP 57:01 What's within a TGT 58:52 TGS-REQ
How those videos are not the number 1 learning resources for AD-related stuff? Amazing work!
I am trying to wrap my head around how exactly delegation works. I needed to abuse RBCD in two boxes, and I did not really grapsed how it worked. You presentations are extremely helpful, thanks for taking the time to make them in English and freely sharing them! Really looking forward to the next 3 videos!
Great bro hope you doing more clip , thanks for your channel , keep up the work
Thank you ،but i need configuration my lab I search in internet but i don't found any resources for lab delegation kerberos
Loved the deep dive explanation. Thank you for all effort and hard work.
Very Nice article, thanks a lot! ps. love the Neon Genesis reference.
please don't stop creating content! i love how you dig into codes
Muy muy bueno!
Muchas gracias estoy proximo a presentar mi examen oscp y esto realmente mi sirvio.
Thanks for Sharing!
gracias por tu video :)
Que bueno Dani!
bro,speeding the speed of posting video !!! you‘re amazing😀
bro,you make a azazing video ,Could you share the pdf , i really wanna dig into it !
You have them in my site -> attl4s.github.io/
Great!
Your content is consistently great and innovative, and shows exceptional creativity,Thank you
I would love to see more evasion techniques + audio explanation just like your recent videos. Keep up the good work!
Thank you for publishing this video in English. Your other videos in Spanish such as constrained vs unconstrained delegation look very interesting too, unfortunately I don't understand Spanish. Not many people talk about these topics on youtube
Thanks! and good news for you, delegation videos are also avaialble in english. Try to search for "[English] You Do (Not) Understand Kerberos Delegation"
Very good! high-quality content
Great content. Thank you sir
Gran video, pero espero un video en español para la comunidad hispana, abrazos!!
Mans single handedly taught me kerberos - looking forward to this.
As usual.. he is back with awesome content 👌
Best infosec video ! ❤
Thank you for the amazing content. The way you present every details calmly, indulges me in your videos. @ATTL4S So the amount of access that user has to directly backend is the same amount of access that the user will be provided access through the front end server when delegating to the backend. Am i right?
Thanks for the kind words! Re your question, yes you are right. The "front end" server will just act on behalf of its clients by impersonating them. So if userA has full access to a shared folder, it will also have full access through the "front end" via delegation.
Why In AD by default selected "do not trust this"....but still kerberos can work?
Sorry, I don't know what you mean
@@ATTL4S In AD if you goto any computers >properties> general tab -have a radio button to select Trust this device or do not trust the device (default)
The best explanation of Kerberos in the whole internet 👏
You make amazing content, Lucid and precise explanation to complex stuff 😍, All my doubts cleared after watching your videos.. Please do continue making these kind of videos.
your videos are really well made with so much useful content!! Thank you for publishing hq content
Awesome videos ! Thanks a lot 🙏✅