Windows Red Team Credential Access Techniques | Mimikatz & WCE

แชร์
ฝัง
  • เผยแพร่เมื่อ 3 ก.พ. 2025

ความคิดเห็น •

  • @Cybersecomar
    @Cybersecomar 3 ปีที่แล้ว +3

    I have been looking for great content in such areas, and I found out much greater content than I expected. Keep up the good work.

  • @darphaprothon20
    @darphaprothon20 3 ปีที่แล้ว +1

    hey man im new in this world , nice work please keet it going never stop

  • @gjsatru3383
    @gjsatru3383 3 ปีที่แล้ว +2

    Alexis you are rocking your content

  • @KA-NV
    @KA-NV 3 ปีที่แล้ว

    Very well explained and informative. In the john the ripper part, there are some hashes that are not valid, so l would delete them before trying the cracking.

  • @poonambisht2697
    @poonambisht2697 3 ปีที่แล้ว +2

    Keep going man ... Content is 🔥

  • @viruldojitha9341
    @viruldojitha9341 3 ปีที่แล้ว +2

    Man this serious is awesome...

  • @Yoyo-qn4mv
    @Yoyo-qn4mv 3 ปีที่แล้ว +1

    you are amazing, and tnq for sharing your knowlage , absolutle better then what I learn in collage XD

  • @bazcon6891
    @bazcon6891 3 ปีที่แล้ว +1

    Its very informative content. Thanks a lot brother

  • @simonb8988
    @simonb8988 3 ปีที่แล้ว +1

    Love your content. Thanks!

  • @kadourkadouri3505
    @kadourkadouri3505 ปีที่แล้ว

    I think from win 10, they kinda start to encourage people to use their MSFT or Hotmail credentials in order to login into their machines.

  • @Saint_sheedy
    @Saint_sheedy 3 ปีที่แล้ว +1

    Valuable

  • @korovamilkplus
    @korovamilkplus 2 ปีที่แล้ว

    As usual, I tested in my lab with the latest updated version of Windows 10.
    First, it's necessary to make sure to migrate to a 64-bit process with administrator privileges.
    Initially, I migrated to explorer.exe and nothing worked, then after switching to lsass.exe things changed.
    In conclusion, I can say that today:
    Mimikatz, Meterpreter's HashDump command, the Kiwi module, and the credential_collector module work perfectly.
    The Unattend.xml file is not in the Panther folder.
    WCE does not work with any parameters.
    The real problem is creating a payload with MSFvenom that is not detected by Windows Defender to start the attack.
    Both Shikata Ga Nai and Shellter are immediately detected.
    Regarding Starkiller, it's easy to evade Windows Defender with Invoke-Obfuscation.
    The problem is that Windows Defender block the powershell/privesc/bypassuac module.
    In any case, thank you so much Alexis for this latest fantastic (free) lesson!
    Your work is invaluable!

  • @Derek6765
    @Derek6765 3 ปีที่แล้ว +1

    Great content!

  • @mrniko1340
    @mrniko1340 3 ปีที่แล้ว +1

    nice work bro

  • @prasantakumar1666
    @prasantakumar1666 3 ปีที่แล้ว

    Make a video on payload crypters to bypass av detection of Android and windows.

    • @8080VB
      @8080VB 3 ปีที่แล้ว

      He have already made a vid on that .

  • @talib_Bijnori
    @talib_Bijnori 3 ปีที่แล้ว

    sir, I'm not able to install metasploitble 2 on my kali Linux , I've been trying for 3 days, I know there is a tutorial on your channel that how to install metasploitble 2, but that was on windows OS, please make a video on installing ms2 on kali Linux, I've stuck on your series (web app penetration testing). Please solve it for me, thank you ❤️

    • @8080VB
      @8080VB 3 ปีที่แล้ว

      Hey still?? , Contact us on his discord server , we'll help you .

    • @talib_Bijnori
      @talib_Bijnori 3 ปีที่แล้ว

      @@8080VB how ?

  • @sprBEAST211
    @sprBEAST211 3 ปีที่แล้ว

    Hasn't mimikatz been replaced by or integrated into kiwi?

    • @HackerSploit
      @HackerSploit  3 ปีที่แล้ว +1

      Kiwi is a mterpreter module, Mimikatz is still an independent tool.

    • @sprBEAST211
      @sprBEAST211 3 ปีที่แล้ว

      @@HackerSploit thank you for the clarification, as well as the great content!

  • @morph2584
    @morph2584 3 ปีที่แล้ว

    My soul is mengheker

  • @mattcargile
    @mattcargile 2 ปีที่แล้ว

    Now do it on win server 2019

  • @talib_Bijnori
    @talib_Bijnori 3 ปีที่แล้ว

    Sir you didn't reply
    Please help me out

  • @armanagrawal4170
    @armanagrawal4170 3 ปีที่แล้ว +1

    Need Part 1 registration link

  • @biswarupguli6220
    @biswarupguli6220 3 ปีที่แล้ว +1

    sir, please make a series on how to successfully hack an Android version 10. Please sir it is humble request to you.