TryHackMe Reset Walkthrough | Active Directory Exploitation
In this video, we walk through the Reset room on TryHackMe, focusing on Active Directory enumeration and exploitation to gain access and capture the flags without authenticaiton. ๐ Scripts, and Commands: ๐ Room Link: -------- โฑ๏ธ Timestamps: 00:00 โ Intro & Target Overview 01:09 โ Enumeration Without Credentials 07:11 โ Username Enumeration 22:46 โ Password Spraying Attack 26:00 โ AS-REP Roasting 29:36 โ Enumeration With Credentials 31:40 โ BloodHound Enumeration & Analysis 40:15 โ GenericAll + ForceChangePassword Exploitation 47:07 โ AllowedToDelegate Abuse 51:12 โ Capture the Flags -------- Follow me for more real-world hacking walkthroughs, live streams, and cert prep content ๐ ๐ฅ Streams & Walkthroughs YouTube: https://www.youtube.com/@strikoder Twitch: https://www.twitch.tv/strikoder ๐ข Updates & Short Content Telegram: https://t.me/strikoder Instagram: https://www.instagram.com/strikoder/ TikTok: https://www.tiktok.com/@strikoder ๐ฌ Community & Discussions Discord Server: https://discord.gg/Jz5ejK4Mc9 X (Twitter): https://x.com/Strikoder ๐ป Projects & Labs GitHub: https://github.com/strikoder Hack The Box (to give respect): https://app.hackthebox.com/profile/1872370 ๐จ Official Contact LinkedIn: https://www.linkedin.com/in/strikoder Email: [email protected] More videos coming soon on PNPT, and OSCP prep. Stay tuned, and thanks for the support! #pt1 #tryhackme #activedirectory #ethicalhacking #cybersecurity #pentesting #Windows #ctf #oscp #strikoder #linux #infosec #pentesting #bugbounty #RedTeam #privilegeescalation #windowshacking #enumeration #networksecurity #capturetheflag #hackingtools #cyberseclabs #terminal #hackermindset #Nmap
Download
0 formatsNo download links available.