7MS #558: How to Build a Vulnerable Pentest Lab - Part 2

7MS #558: How to Build a Vulnerable Pentest Lab - Part 2

Today we continue part 2 of a series we started a few weeks ago all about building a vulnerable pentesting lab. Check out the video above, and here are the main snippets of code and tips to get you going:

  • Use Youzer to import a bunch of bogus users into your Active Directory:
sudo python ./youzer.py --generate --generate_length 20 --ou "ou=Contractors,dc=brifly,dc=us" --domain brifly.us --users 1000 --output lusers.csv
  • Make a Kerberoastable user:
New-AdUser -Name "Kerba Roastable" -GivenName "Kerba" -Surname "Roastable" -SamAccountName Kerba -Description "ROASTED!" -Path "OU=Contractors,DC=brifly,DC=us" -AccountPassword (ConvertTo-SecureString "Password1" -AsPlainText -force) -passThru -PasswordNeverExpires $true enable-adaccount Kerba setspn -a IIS_SITE/brifly-dc01.brily.us:77777 briflyus\kerba

Populärt inom Politik & nyheter

p3-krim
flashback-forever
olyckan-inifran
svd-dokumentara-berattelser-2
rss-vad-fan-hande
rss-viva-fotboll
svenska-fall
rss-sanning-konsekvens
aftonbladet-daily
fordomspodden
motiv
krimmagasinet
blenda-2
rss-krimstad
dagens-eko
rss-frandfors-horna
spar
spotlight
rss-expressen-dok
svd-nyhetsartiklar