Hunt for Domain Controller : Building Active Directory Penetration testing lab null Bhopal Puliya 21 July 2019 Null Bhopal Puliya Session
The Session is focussed to give the attendees a basic understanding of how the Active Directory Works and What are the insights of Active Directory. In the Session we will also encounter phases where we will see the configuration made by the Administrator from the perspective of Penetration Tester. After Seeing the Insights of Active Directory we will be Setting Up the Lab for Further Pentesting in the Active Directory Environment. The AD Environment will be made in order to mimic the Enterprise level Environment so that we can get a Realistic View of the whole Scenario. After the Completion of Setting up the Lab we will get our hands a bit dirty by Scanning and Enumerating the Active Directory environment that we have created. In this Session we will also discuss some Tools, Tactics, and Procedures (TTPs) to stimulate an attack on our Active Directory Environment.
System Requirement for the Hands-On experience:
● VMware Workstation/ Player or Oracle Virtual Box
● Minimum of 8 GB RAM
● Good Internet Connection
Information Security Enthusiast who wants to explore the field of Information Security.
Starts at Sunday July 21 2019, 10:00 AM. The sessions runs for about 2 hours.