
Pen Testing Active Directory Environments
Our free step-by-step Ebook will show you all the tools and tactics that hackers use to leverage AD in post-exploitation.
Have you ever pen tested your Active Directory environment?
Hackers have known for a long time that Active Directory is a very rich source of metadata that can be used to accelerate the post-exploitation process.
Want to learn all the tools and tactics that they use to leverage AD in post-exploitation?
We'll explain how crackmapexec, PowerView, and a little graph theory can be used to ferret out vulnerabilities in your Active Directory environments before hackers find them.
What's covered...
- Crackmapexec and PowerView
- Getting Stuff Done With PowerView
- Chasing Power Users
- Graph Fun
- Admins and Graphs
- The Final Case