t105 Abusing Active Directory in Post Exploitation Carlos Perez

t105 Abusing Active Directory in Post Exploitation Carlos Perez

DEFCON 15: One Token to Rule Them All: Post-Exploitation Fun in Windows EnvironmentsПодробнее

DEFCON 15: One Token to Rule Them All: Post-Exploitation Fun in Windows Environments

Carlos Perez - Tracking Activity and Abuse of PowerShellПодробнее

Carlos Perez - Tracking Activity and Abuse of PowerShell

Carlos Perez (darkoperator) -- Tactical Post ExploitationПодробнее

Carlos Perez (darkoperator) -- Tactical Post Exploitation

Tradecraft Series – Fundamentals of Post Exploitation with Carlos Perez- Part 1Подробнее

Tradecraft Series – Fundamentals of Post Exploitation with Carlos Perez- Part 1

Tradecraft Series – Fundamentals of Post Exploitation with Carlos Perez - Part 3Подробнее

Tradecraft Series – Fundamentals of Post Exploitation with Carlos Perez - Part 3

Active Directory Pentesting - 21 Post Exploitation with CrackMapExecПодробнее

Active Directory Pentesting - 21 Post Exploitation with CrackMapExec

Agentless Post-ExploitationПодробнее

Agentless Post-Exploitation

Learn Active Directory KerberoastingПодробнее

Learn Active Directory Kerberoasting

Evan Anderson: Active Directory Reconnaissance - Attacks and Post-ExploitationПодробнее

Evan Anderson: Active Directory Reconnaissance - Attacks and Post-Exploitation

Defcon 21 - PowerPreter: Post Exploitation Like a BossПодробнее

Defcon 21 - PowerPreter: Post Exploitation Like a Boss

Fix Me05 Operating in the Shadows Carlos PerezПодробнее

Fix Me05 Operating in the Shadows Carlos Perez

Abusing Active Directory @ #HITB2021SINПодробнее

Abusing Active Directory @ #HITB2021SIN

Carlos Perez - Abusing Active Directory with Posh (Español)Подробнее

Carlos Perez - Abusing Active Directory with Posh (Español)