{"id":9591,"date":"2022-11-04T05:44:18","date_gmt":"2022-11-04T05:44:18","guid":{"rendered":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/product\/abusing-active-directory-on-prem-azure-hitb2023ams\/"},"modified":"2023-04-18T06:25:49","modified_gmt":"2023-04-18T06:25:49","slug":"abusing-active-directory-on-prem-azure-hitb2023ams","status":"publish","type":"product","link":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/product\/abusing-active-directory-on-prem-azure-hitb2023ams\/","title":{"rendered":"Abusing Active Directory (On-Prem &amp; Azure)"},"content":{"rendered":"<div class=\"page\" title=\"Page 3\">\n<div class=\"layoutArea\">\n<div class=\"page\" title=\"Page 3\">\n<div class=\"layoutArea\">\n<div class=\"page\" title=\"Page 3\">\n<div class=\"layoutArea\">\n<h2><strong><span style=\"color: #993300\">REGISTRATION CLOSED<\/span><\/strong><\/h2>\n<h4><strong>DATE: 17-18 April 2023<\/strong><\/h4>\n<h4><strong>TIME: 09:00 to 17:00 CEST\/GMT+2<\/strong><\/h4>\n<\/div>\n<\/div>\n<table style=\"height: 126px\" width=\"669\">\n<tbody>\n<tr>\n<td><strong>Date<\/strong><\/td>\n<td><strong>Day<\/strong><\/td>\n<td style=\"text-align: left\"><strong>Time<\/strong><\/td>\n<td><strong>Duration<\/strong><\/td>\n<\/tr>\n<tr>\n<td>17 Apr<\/td>\n<td>Monday<\/td>\n<td>09:00 to 17:00 CEST\/GMT+2<\/td>\n<td>8 Hours<\/td>\n<\/tr>\n<tr>\n<td>18 Apr<\/td>\n<td>Tuesday<\/td>\n<td>09:00 to 17:00 CEST\/GMT+2<\/td>\n<td>8 Hours<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<hr \/>\n<h5>NO port scanning<br \/>\nNO vulnerability scanning<br \/>\nNO Metasploit<\/h5>\n<p>Discover how APTs abuse Active Directory both on-prem and in the cloud. For system engineers, defenders, penetration testers and aspiring blue teamers, get introduced to active directory hacking based on real life scenarios and misconfigurations.<\/p>\n<p>In this two-day training you will take a deep dive into modern day misconfigurations and attacks with labs built on fully patched Windows Server 2019, Windows 10 Enterprise and Azure Active Directory.<\/p>\n<p>The course is designed to be beginner friendly but does require some basic knowledge of security concepts. You will quickly get your hands dirty with enumerating Active Directory users, groups, OUs, ACLs, ACEs etc.<\/p>\n<p>Shortly after spotting the issues, you will start exploiting them to slowly move through the network and escalate privileges until becoming a domain admin. Along the way, you will gain a deep understanding of concepts such as lateral movement, different authentication protocols and tools used by red teamers and APTs.<\/p>\n<p>The second day of the course takes the perspective of pivoting from the on-premises AD to compromising Azure AD. And the other way around. You will understand the difference between on-premises and cloud Active Directory, the different attack vectors and how compromising one can lead to comprising the other.<\/p>\n<p>You will get a solid understanding of hybrid environments, modern authentication protocols, different ways to get, escalate and maintain access.<\/p>\n<p>&nbsp;<\/p>\n<h5><strong>The course will finish with a short CTF that helps test your understanding and solidify the concepts you&#8217;ve learned during the two days.<\/strong><\/h5>\n<ul>\n<li>Enumeration deep dive into user account, groups, OUs, GPOs<\/li>\n<li>Understanding and enumerating ACLs<\/li>\n<li>Lateral movement<\/li>\n<li>Different password attacks<\/li>\n<li>Understanding authentication protocols and different attacks (NTLM relay, PTH, Over-PTH, etc.)<\/li>\n<li>Kerberos deep dive and multiple attacks (AS-REP roasting, kerberoasting, silver ticket, golden ticket)<\/li>\n<li>Pivoting between Azure AD and on-prem AD<\/li>\n<li>Stealing tokens<\/li>\n<li>Abusing playbooks<\/li>\n<li>Looting secrets<\/li>\n<li>Abusing VMs<\/li>\n<li>Abusing container registries<\/li>\n<li>And a lot more!<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h5><strong>Key Learning Objectives<\/strong><\/h5>\n<div class=\"elementor-element elementor-element-58a7b6b elementor-widget elementor-widget-jet-listing-dynamic-field\" data-id=\"58a7b6b\" data-element_type=\"widget\" data-widget_type=\"jet-listing-dynamic-field.default\">\n<div class=\"elementor-widget-container\">\n<div class=\"jet-listing jet-listing-dynamic-field display-inline\">\n<div class=\"jet-listing-dynamic-field__inline-wrap\">\n<div class=\"jet-listing-dynamic-field__content\">\n<ul>\n<li>Practical hands-on training that allows for exploiting real-world on-premise and Azure misconfigurations.<\/li>\n<li>Penesters, red teamers and sys admins will get a solid understanding of the root cause of the abusable misconfigurations.<\/li>\n<li>Deep understanding of modern protocols, techniques and toolsets relavant to on-prem and Azure AD.<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p>&nbsp;<\/p>\n<h5 id=\"provided\"><strong>Student will be provided with<\/strong><\/h5>\n<div class=\"session-text-block\">\n<p>Course material<\/p>\n<ul>\n<li>Cloud labs will be available for each student for 270 hours usage (within 90 days from the start of the training)<\/li>\n<li>The instructors will share their own lab guide so students can replicate the setup in their private labs<\/li>\n<li>Scripts to automate on-prem lab creation<\/li>\n<\/ul>\n<\/div>\n<p>&nbsp;<\/p>\n<h5><strong>Watch this video to get a feel of Tarek&#8217;s online training where he explains AS-REP Roasting &#8211; a topic that is covered in more detail in the training.<\/strong><\/h5>\n<p><iframe title=\"Kerberos AS-REP Roasting with HTB Sauna\" width=\"800\" height=\"450\" src=\"https:\/\/www.youtube.com\/embed\/3GvcfQSOj5E?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" allowfullscreen><\/iframe><\/p>\n<h5><strong>Topics Covered<br \/>\n<\/strong><\/h5>\n<p>&nbsp;<\/p>\n<p><strong>Active Directory introduction<\/strong><\/p>\n<p>&#8211; Components<br \/>\n&#8211; Trees and forests<br \/>\n&#8211; Enumeration<strong><br \/>\n<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p><strong>User Account deep dive<\/strong><\/p>\n<p>&#8211; Security principles<br \/>\n&#8211; Security contexts<br \/>\n&#8211; SID\/RIDs<br \/>\n&#8211; UPN<br \/>\n&#8211; User enumeration<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Groups and OUs<\/strong><\/p>\n<p>&#8211; Types and scope<br \/>\n&#8211; Difference between groups and OUs<br \/>\n&#8211; Attributes<br \/>\n&#8211; Enumerating group and OUs<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Computer Objects<\/strong><\/p>\n<p>&#8211; Understanding and enumerating computer objects<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Access Control<\/strong><\/p>\n<p>&#8211; ACEs<br \/>\n&#8211; ACLs<br \/>\n&#8211; DACLs\/SACLs<br \/>\n&#8211; Understanding bad permissions<br \/>\n&#8211; Enumerating permissions<br \/>\n&#8211; Abusing permissions<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Password Attacks<\/strong><\/p>\n<p>&#8211; Password profiling<br \/>\n&#8211; Understanding password policies<br \/>\n&#8211; Enumerating password policies<br \/>\n&#8211; Password spraying<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Lateral Movement<\/strong><\/p>\n<p>&#8211; PSExec, WMI, PS<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Hash and Authentication Protocols<\/strong><\/p>\n<p>&#8211; Different types of hashes<br \/>\n&#8211; MS-NLMP<br \/>\n&#8211; Capture NTLMv2 hashes<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Dumping Hashes<\/strong><\/p>\n<p>&#8211; Understanding LSASS<br \/>\n&#8211; Understanding Mimikatz modules and output<br \/>\n&#8211; Pass the hash<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Kerberos<\/strong><\/p>\n<p>&#8211; Kerberos deep dive<br \/>\n&#8211; AS-REP Roasting<br \/>\n&#8211; Kerberoasting<br \/>\n&#8211; Silver Ticket<br \/>\n&#8211; Golden Ticket<\/p>\n","protected":false},"excerpt":{"rendered":"<p>REGISTRATION CLOSED DATE: 17-18 April 2023 TIME: 09:00 to 17:00 CEST\/GMT+2 Date Day Time Duration 17 Apr Monday 09:00 to 17:00 CEST\/GMT+2 8 Hours 18 Apr Tuesday 09:00 to 17:00 CEST\/GMT+2 8 Hours NO port scanning NO vulnerability scanning NO Metasploit Discover how APTs abuse Active Directory both on-prem and in the cloud. For system [&hellip;]<\/p>\n","protected":false},"featured_media":10648,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false},"product_cat":[58,55,56],"product_tag":[],"class_list":{"0":"post-9591","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-2-day-training","7":"product_cat-hitb2023ams","8":"product_cat-in-person","10":"first","11":"instock","12":"featured","13":"shipping-taxable","14":"purchasable","15":"product-type-simple"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Abusing Active Directory - Live virtual training at Hack In The Box<\/title>\n<meta name=\"description\" content=\"The course focuses on modern day misconfigurations and attacks with labs built on fully patched Windows Server 2019 and Windows 10 Enterprise.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/product\/abusing-active-directory-on-prem-azure-hitb2023ams\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Abusing Active Directory - Live virtual training at Hack In The Box\" \/>\n<meta property=\"og:description\" content=\"The course focuses on modern day misconfigurations and attacks with labs built on fully patched Windows Server 2019 and Windows 10 Enterprise.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/product\/abusing-active-directory-on-prem-azure-hitb2023ams\/\" \/>\n<meta property=\"og:site_name\" content=\"HITBSecConf2023 - Amsterdam\" \/>\n<meta property=\"article:modified_time\" content=\"2023-04-18T06:25:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/wp-content\/uploads\/sites\/18\/2022\/11\/khalifa2-BH-Vegas.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"900\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/product\/abusing-active-directory-on-prem-azure-hitb2023ams\/\",\"url\":\"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/product\/abusing-active-directory-on-prem-azure-hitb2023ams\/\",\"name\":\"Abusing Active Directory - Live virtual training at Hack In The Box\",\"isPartOf\":{\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/product\/abusing-active-directory-on-prem-azure-hitb2023ams\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/product\/abusing-active-directory-on-prem-azure-hitb2023ams\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/wp-content\/uploads\/sites\/18\/2022\/11\/khalifa2-BH-Vegas.png\",\"datePublished\":\"2022-11-04T05:44:18+00:00\",\"dateModified\":\"2023-04-18T06:25:49+00:00\",\"description\":\"The course focuses on modern day misconfigurations and attacks with labs built on fully patched Windows Server 2019 and Windows 10 Enterprise.\",\"breadcrumb\":{\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/product\/abusing-active-directory-on-prem-azure-hitb2023ams\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/product\/abusing-active-directory-on-prem-azure-hitb2023ams\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/product\/abusing-active-directory-on-prem-azure-hitb2023ams\/#primaryimage\",\"url\":\"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/wp-content\/uploads\/sites\/18\/2022\/11\/khalifa2-BH-Vegas.png\",\"contentUrl\":\"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/wp-content\/uploads\/sites\/18\/2022\/11\/khalifa2-BH-Vegas.png\",\"width\":1200,\"height\":900},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/product\/abusing-active-directory-on-prem-azure-hitb2023ams\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Products\",\"item\":\"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/shop\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Abusing Active Directory (On-Prem &amp; Azure)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/#website\",\"url\":\"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/\",\"name\":\"HITBSecConf2023 - Amsterdam\",\"description\":\"#HITB2021AMS\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Abusing Active Directory - Live virtual training at Hack In The Box","description":"The course focuses on modern day misconfigurations and attacks with labs built on fully patched Windows Server 2019 and Windows 10 Enterprise.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/product\/abusing-active-directory-on-prem-azure-hitb2023ams\/","og_locale":"en_US","og_type":"article","og_title":"Abusing Active Directory - Live virtual training at Hack In The Box","og_description":"The course focuses on modern day misconfigurations and attacks with labs built on fully patched Windows Server 2019 and Windows 10 Enterprise.","og_url":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/product\/abusing-active-directory-on-prem-azure-hitb2023ams\/","og_site_name":"HITBSecConf2023 - Amsterdam","article_modified_time":"2023-04-18T06:25:49+00:00","og_image":[{"width":1200,"height":900,"url":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/wp-content\/uploads\/sites\/18\/2022\/11\/khalifa2-BH-Vegas.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/product\/abusing-active-directory-on-prem-azure-hitb2023ams\/","url":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/product\/abusing-active-directory-on-prem-azure-hitb2023ams\/","name":"Abusing Active Directory - Live virtual training at Hack In The Box","isPartOf":{"@id":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/#website"},"primaryImageOfPage":{"@id":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/product\/abusing-active-directory-on-prem-azure-hitb2023ams\/#primaryimage"},"image":{"@id":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/product\/abusing-active-directory-on-prem-azure-hitb2023ams\/#primaryimage"},"thumbnailUrl":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/wp-content\/uploads\/sites\/18\/2022\/11\/khalifa2-BH-Vegas.png","datePublished":"2022-11-04T05:44:18+00:00","dateModified":"2023-04-18T06:25:49+00:00","description":"The course focuses on modern day misconfigurations and attacks with labs built on fully patched Windows Server 2019 and Windows 10 Enterprise.","breadcrumb":{"@id":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/product\/abusing-active-directory-on-prem-azure-hitb2023ams\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/conference.hitb.org\/hitbsecconf2023ams\/product\/abusing-active-directory-on-prem-azure-hitb2023ams\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/product\/abusing-active-directory-on-prem-azure-hitb2023ams\/#primaryimage","url":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/wp-content\/uploads\/sites\/18\/2022\/11\/khalifa2-BH-Vegas.png","contentUrl":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/wp-content\/uploads\/sites\/18\/2022\/11\/khalifa2-BH-Vegas.png","width":1200,"height":900},{"@type":"BreadcrumbList","@id":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/product\/abusing-active-directory-on-prem-azure-hitb2023ams\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/"},{"@type":"ListItem","position":2,"name":"Products","item":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/shop\/"},{"@type":"ListItem","position":3,"name":"Abusing Active Directory (On-Prem &amp; Azure)"}]},{"@type":"WebSite","@id":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/#website","url":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/","name":"HITBSecConf2023 - Amsterdam","description":"#HITB2021AMS","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/wp-json\/wp\/v2\/product\/9591"}],"collection":[{"href":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/wp-json\/wp\/v2\/types\/product"}],"replies":[{"embeddable":true,"href":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/wp-json\/wp\/v2\/comments?post=9591"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/wp-json\/wp\/v2\/media\/10648"}],"wp:attachment":[{"href":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/wp-json\/wp\/v2\/media?parent=9591"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/wp-json\/wp\/v2\/product_cat?post=9591"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/wp-json\/wp\/v2\/product_tag?post=9591"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}