1 00:00:01,180 --> 00:00:04,050 Welcome to the Active Directory portion of our course. 2 00:00:04,090 --> 00:00:10,360 Now I'm super excited to cover this part of the course because I think it's one of the most overlooked 3 00:00:10,360 --> 00:00:13,930 part of any course that's out there right now. 4 00:00:13,930 --> 00:00:19,350 Now some courses are starting to touch on it but a lot of them are failing to do so and too. 5 00:00:19,360 --> 00:00:25,060 It's as you're going to find out one of the most important items to learn when it comes to ethical hacking 6 00:00:25,450 --> 00:00:32,400 and three a little bit bias but internal slash Active Directory pen testing is by far my favorite. 7 00:00:32,440 --> 00:00:39,220 It goes so deep there's so many possibilities and these questions are going to come up or these this 8 00:00:39,220 --> 00:00:44,110 building a lab everything we're going to do in this section the course is going to come up in an interview 9 00:00:44,200 --> 00:00:48,550 and you're gonna be ready to nail those sections because you're going to have a lot of these answers 10 00:00:48,550 --> 00:00:49,190 down. 11 00:00:49,270 --> 00:00:52,320 So I'm very very excited to start covering this. 12 00:00:52,330 --> 00:00:56,290 So before we can do that I do have a little bit of Death by PowerPoint. 13 00:00:56,290 --> 00:01:00,760 We're probably in do two to three videos we'll keep them short as possible but you have to understand 14 00:01:00,760 --> 00:01:06,790 what Active Directory is before we can go out and build Active Directory and then attack Active Directory. 15 00:01:06,790 --> 00:01:08,290 So let's get started. 16 00:01:09,130 --> 00:01:11,560 So what is active directory. 17 00:01:11,560 --> 00:01:16,510 Well you can think of Active Directory as like a phone book. 18 00:01:16,590 --> 00:01:22,900 OK in this phone book stores all kinds of information and these information you can think of them as 19 00:01:22,960 --> 00:01:23,940 objects. 20 00:01:24,070 --> 00:01:30,970 And that's something like a computer or a user or a printer all these objects are stored in this phone 21 00:01:30,970 --> 00:01:36,910 book and we call these directory services and Active Directory is used by windows. 22 00:01:36,910 --> 00:01:42,310 Now chances are if you've ever worked in a work environment you probably use Active Directory and we'll 23 00:01:42,310 --> 00:01:45,150 cover that a little bit on the next slide as well. 24 00:01:45,160 --> 00:01:49,650 Think about logging in your computer you get to work you logging into a computer. 25 00:01:49,660 --> 00:01:57,700 You probably have you know a username and password and you go you log in with that username and password 26 00:01:57,970 --> 00:02:03,610 but say maybe there's another computer either in a different building or just in a different location 27 00:02:03,640 --> 00:02:09,670 or maybe you have a laptop and you go to use that computer and you use the same username and password 28 00:02:10,120 --> 00:02:13,970 and then when you sign into your email use the same username and password. 29 00:02:14,110 --> 00:02:21,430 And it's because using something called Active Directory so you can have just as one username and password 30 00:02:21,700 --> 00:02:26,050 and you can authenticate around the network using these credentials. 31 00:02:26,050 --> 00:02:31,180 And now this authentication is going to be using something called cobras and we'll talk about that a 32 00:02:31,180 --> 00:02:34,820 little bit later in the course and specifically how we can attack it. 33 00:02:34,960 --> 00:02:40,510 But for now just know that authentication on Windows based devices using Active Directory is something 34 00:02:40,510 --> 00:02:43,390 called cobras and they use tickets. 35 00:02:43,540 --> 00:02:47,020 So why Active Directory what why is it so important. 36 00:02:47,020 --> 00:02:53,750 Well Active Directory is the most commonly used identity management service in the world now. 37 00:02:53,760 --> 00:02:59,530 Ninety five percent of the Fortune 1000 companies use it in their networks. 38 00:02:59,530 --> 00:03:01,390 Ninety five percent. 39 00:03:01,390 --> 00:03:03,150 So let me break this down for you. 40 00:03:03,430 --> 00:03:07,420 When we do internal assessments we do internal pen tests. 41 00:03:07,420 --> 00:03:11,150 Never have I ever had an environment that I pen tested against. 42 00:03:11,200 --> 00:03:13,120 That was not active directory. 43 00:03:13,120 --> 00:03:16,480 This is so important when it comes to interviewing. 44 00:03:16,570 --> 00:03:20,950 When it comes to real life experience this is the bread and butter. 45 00:03:21,250 --> 00:03:26,860 Everything as I said before all these courses out there they teach external not a lot. 46 00:03:26,860 --> 00:03:27,660 Teach internal. 47 00:03:27,670 --> 00:03:29,770 This is really where the money is made. 48 00:03:30,340 --> 00:03:34,940 So being able to exploit an environment from the inside. 49 00:03:34,990 --> 00:03:36,910 SUPER SUPER important. 50 00:03:36,910 --> 00:03:38,830 So again with Active Directory. 51 00:03:38,830 --> 00:03:45,760 The nice thing too is we can exploit it with our ever being an exploit available to us. 52 00:03:45,790 --> 00:03:49,570 So there doesn't have to be a parable exploit in the environment. 53 00:03:49,690 --> 00:03:54,970 We could take advantage of what Active Directory does by default what it's considered in some cases 54 00:03:54,970 --> 00:04:01,000 a feature in exploit that so we can abuse features trust components or so many different things that 55 00:04:01,000 --> 00:04:04,990 active directory that we can abuse because their features. 56 00:04:05,110 --> 00:04:06,870 That's a really nice thing as well. 57 00:04:06,910 --> 00:04:10,310 So it comes down as you're going to see when we talk about defenses. 58 00:04:10,330 --> 00:04:17,350 It comes a lot down to policy and a lot of policies are just not in place and environments and internal 59 00:04:17,350 --> 00:04:19,170 assessments can be bloodbaths. 60 00:04:19,210 --> 00:04:24,520 When I talked to a few videos ago about these external networks and them being fortified in that you're 61 00:04:24,520 --> 00:04:28,170 really not going to find your way in that easily. 62 00:04:28,270 --> 00:04:34,570 And then the internal network being like the inside of a house you fortify the the external you fortify 63 00:04:34,570 --> 00:04:38,390 your outside your house but you really don't think about the locks on the inside. 64 00:04:38,530 --> 00:04:41,130 And that's what happens a lot of times of Active Directory. 65 00:04:41,170 --> 00:04:43,720 It can get messy very fast. 66 00:04:43,720 --> 00:04:48,670 So it's important to have this knowledge it's important to understand how to attack it and what some 67 00:04:48,670 --> 00:04:50,200 of the common attacks are. 68 00:04:50,200 --> 00:04:53,830 It's important to know what Active Directory is as a big overview. 69 00:04:53,860 --> 00:04:58,990 So we're gonna cover what Active Directory is as overview and then we're gonna dive into building our 70 00:04:58,990 --> 00:05:04,490 lab and we'll dive into attacking our lab is going to be super super fun. 71 00:05:04,490 --> 00:05:05,900 This is my fair part of the course. 72 00:05:06,260 --> 00:05:09,740 So let's go ahead and move into the next video. 73 00:05:09,770 --> 00:05:13,040 We're gonna start talking about physical Active Directory components.