CEH v12: AD Enumeration, Mimikatz, and Pivoting Techniques

CEH v12    |    Intermediate
  • 3 videos | 1h 14m 56s
  • Includes Assessment
  • Earns a Badge
Rating 1.0 of 1 users Rating 1.0 of 1 users (1)
Enumerating the Active Directory (AD) during a pentest is important to identify vulnerabilities and attack vectors that may be used to gain unauthorized access to the network. In this course, you will learn about enumeration tools that can help to identify misconfigurations or policy violations that may put the organization at risk. You'll explore how the mimikatz tool is used to extract sensitive information - such as authentication credentials - from a computer system's memory to test its security. Next, explore how pivoting is used to gain access to other systems within a network and learn about tools and techniques used for pivoting by ethical hackers. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v12 (312-50) exam.

WHAT YOU WILL LEARN

  • Enable script execution in powershell
    use powerview.ps1 to enumerate a windows domain
    use powerview.ps1 to display forest information for a windows domain
    Use mimikatz in a post exploitation scenario
    use mimikatz to inject a skeleton key into lsass on the domain controller
    use mimikatz to impersonate a domain controller to extract hashes for user accounts
  • use the skeleton key to log on to a system
    extract the sid of a user account on a windows system
    Identify common tools used for pivoting
    enable port forwarding as part of pivoting from a compromised system
    use various commands to perform pivoting post exploitation
    use a combination of tool for pivoting

IN THIS COURSE

  • Locked
    1.  AD Enumeration
    21m 49s
    After completing this video, you will be able to outline tools that can help to identify misconfigurations or policy violations that may put the organization at risk. FREE ACCESS
  • Locked
    2.  Mimikatz
    29m 9s
    In this video, we will explore some of the common use cases of the mimikatz tool for ethical hacking. FREE ACCESS
  • Locked
    3.  Pivoting
    23m 59s
    Upon completion of this video, you will be able to identify common tools and techniques used for pivoting by ethical hackers. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 5 users Rating 4.6 of 5 users (5)
Rating 4.5 of 12 users Rating 4.5 of 12 users (12)
Rating 4.4 of 5 users Rating 4.4 of 5 users (5)