1 00:00:00,150 --> 00:00:06,540 Welcome to this section on attacking Active Directory posts compromise attacks. 2 00:00:06,780 --> 00:00:13,440 So all the attacks that I'm about to introduce you to in this section involve having some sort of credential 3 00:00:13,520 --> 00:00:14,340 first. 4 00:00:14,870 --> 00:00:21,030 So we have to have a username password or a shall on a machine or something along those lines. 5 00:00:21,060 --> 00:00:24,110 In order for these attacks to be effective. 6 00:00:24,270 --> 00:00:28,650 So we're going to be covering attacks like pass the hash pass the password. 7 00:00:28,680 --> 00:00:35,970 We'll talk about token impersonation and Kerber roasting GP slash C password attacks and golden ticket 8 00:00:35,970 --> 00:00:36,500 attacks. 9 00:00:36,510 --> 00:00:40,650 And you don't have to have any idea what I'm talking about right now I'm just kind of giving you a quick 10 00:00:40,710 --> 00:00:41,600 overview. 11 00:00:41,730 --> 00:00:48,570 So just keep in mind that these attacks require compromise already and there are some of the best attacks 12 00:00:48,600 --> 00:00:53,850 that we can leverage in a network once we do have compromise so really excited to go over this and really 13 00:00:53,850 --> 00:00:57,540 excited to take you down this learning path of these attacks. 14 00:00:57,540 --> 00:00:59,940 So let's go ahead and jump into the first one. 15 00:01:00,030 --> 00:01:02,580 We start covering pass the hash and pass the password.