Penetration Testing with Kali Linux
PWK - Copyright © 2023 OffSec Services Limited. All rights reserved.
29
We wrap up this portion of the course with an exploration of
The Metasploit Framework
(MSF).
16
MSF is a powerful set of tools that help us automate many of the enumeration and exploitation
steps we’ve learned so far.
2.3.6
Active Directory
Active Directory
17
is one of the most complex and important technologies for us to learn as
penetration testers because it is ubiquitous in today’s enterprise environment. PWK dedicates
three Modules to this area:
Active Directory Introduction and Enumeration
paints a picture of how
to think specifically about Windows machines in the context of an Active Directory domain. We
will learn how to gather information and set ourselves up to more thoroughly compromise a
network.
Then,
Attacking Active Directory Authentication
provides us with several techniques to increase
our presence within the network by attacking or bypassing authentication protocols. Finally,
Lateral Movement in Active Directory
helps us understand how to
apply many of the pivoting
concepts we’ve previously learned in complex AD environments.
2.3.7
Challenge Lab Preparation
The final two PWK Modules represent a bridge between the text, video, and exercise based
learning modalities and the Challenge Labs themselves. By this
point the learner will have
completed over 300 exercises, including the compromise of approximately 25 machines. Now it’s
time to put it all together. In
Assembling the Pieces
, we walk the learner through a simulated
penetration test of five machines.
Techniques from
Information Gathering
all the way through
Lateral Movement in Active Directory
are required to successfully compromise the domain.
Learners will be able to follow along and see exactly how we think about targeting a new
environment from start to finish.
Finally,
Yüklə
Dostları ilə paylaş: