Active Directory through the eyes of a hacker
after payment (24/7)
(for all gadgets)
(including for Apple and Android)
The architecture of the Active Directory security system is considered. Provides information about the tools used by hackers. All stages of an attack on a domain through the eyes of an attacker are described consistently and in detail: searching for vulnerabilities and reconnaissance in the attacked network, escalating privileges, lateral movement, searching and collecting critical data. Methods for countering attack detection using various tools are described. Methods for maintaining access to a compromised network are discussed, both using third-party tools and using domain group policies.
For penetration testers, information security specialists and system administrators
Data sheet
- Name of the Author
- Ralf Hacker
- Language
- Russian