Discussing Active Directory & Internal Network Security

Sdílet
Vložit
  • čas přidán 19. 05. 2024
  • jh.live/threatreport || Conversations on network security and internal pentesting with James "Shikata" at IBM X-Force! We dig into misconfigurations, default weaknesses, and some great tradecraft and techniques. jh.live/x-force-yt
    You can check out the full IBM X-Force Threat Intelligence Index report here jh.live/threatreport and learn more about IBM X-Force here: jh.live/x-force-yt
    Learn Cybersecurity - Name Your Price Training with John Hammond: nameyourpricetraining.com
    WATCH MORE:
    Dark Web & Cybercrime Investigations: • Tracking Cybercrime on...
    Malware & Hacker Tradecraft: • Malware Analysis & Thr...
    📧JOIN MY NEWSLETTER ➡ jh.live/email
    🙏SUPPORT THE CHANNEL ➡ jh.live/patreon
    🤝 SPONSOR THE CHANNEL ➡ jh.live/sponsor
    🌎FOLLOW ME EVERYWHERE ➡ jh.live/twitter ↔ jh.live/linkedin ↔ jh.live/discord ↔ jh.live/instagram ↔ jh.live/tiktok
    💥 SEND ME MALWARE ➡ jh.live/malware
    🔥CZcams ALGORITHM ➡ Like, Comment, & Subscribe!

Komentáře • 52

  • @jaggarhenry
    @jaggarhenry Před 24 dny +20

    The best AD hacker by far. His workshop at DEFCON is gold.

  • @shikata_nai
    @shikata_nai Před 24 dny +52

    Really was a pleasure coming on and doing an interview. I’ll make sure my headphone cable is untied next time lol. We should totally do some hands on demos together.

    • @rochanathaveesha8341
      @rochanathaveesha8341 Před 23 dny +4

      You're a legend James! Looking forward to more content from you on AD and OT security.

    • @ScetheTrashworn
      @ScetheTrashworn Před 20 dny

      yoink

    • @chaeynz
      @chaeynz Před 10 dny

      Great talk shikeezee

    • @BLKMGK4
      @BLKMGK4 Před 5 dny

      You really do nail some of the issues seen day in and out and did it well, thanks!

  • @Monkey_lol_
    @Monkey_lol_ Před 24 dny +37

    the tangled up cord is tickling my OCD in all the wrong ways

    • @takshashilacorporate9787
      @takshashilacorporate9787 Před 24 dny +4

      Why did you have had to point it out! Now, I can't get it out of my head!! ☹️😭😭

    • @Mauzy0x00
      @Mauzy0x00 Před 24 dny +2

      Glad I’m not the only one 😂

    • @Mr0rris0
      @Mr0rris0 Před 24 dny

      Goddamn ysmnaya

  • @joekellyou
    @joekellyou Před 22 dny +5

    I’d love for either a three way or 2-part video with you two and a blue teamer. Show the default config getting pwned, then show the blue teamer fixing the config so the attack is stopped!

  • @IndyAdvant
    @IndyAdvant Před 24 dny +29

    lol that tangled phone cable. brings me back

    • @Alfred-Neuman
      @Alfred-Neuman Před 24 dny

      That's pretty bad for my OCD! XD

    • @HyperDroids
      @HyperDroids Před 24 dny

      What makes it worse is that you know he affords better. 🤣

  • @tanq1687
    @tanq1687 Před 24 dny +1

    Amazing interview John, very high quality guest! Keep these types of interview videos coming!

  • @fbifido2
    @fbifido2 Před 24 dny +10

    Can you show and explain how to fully secure active directory plus all machine/services in that domain?
    - AD domain service
    - AD Certificate Service
    - Domain jointed devices (PC, Laptop, Servers, printers, etc..)

    • @wandererx86
      @wandererx86 Před 24 dny

      That would be great

    • @joekellyou
      @joekellyou Před 22 dny

      I would imagine that video would have to be a live stream of a blue team just at work every day for the next 20 years 🤣

    • @seansingh4421
      @seansingh4421 Před 22 dny +1

      Yubikey PIV or any HSM based secure key-value storage. That also protects against lsass.exe dumping exploits. Also strict Applocker policies, auditing logins, closing all unused network ports and using IDS or IPS. However using STIG and NIST based configurations would make your systems very secure but they could be very much pain in the ass. But yeah Applocker and network segmentation is a big one

    • @wandererx86
      @wandererx86 Před 22 dny

      @@seansingh4421 very well-said

  • @onedrum13
    @onedrum13 Před 23 dny +1

    I wonder what the raw video would be like, without all of the cuts. Interesting talk, very good points

  • @jordanbourcier2424
    @jordanbourcier2424 Před 23 dny +1

    Great video! I think all IT pros should be required to watch this video

  • @xCheddarB0b42x
    @xCheddarB0b42x Před 24 dny +2

    The remarks on segmentation were eye opening. 👀

  • @hexsh
    @hexsh Před 24 dny

    love my boy Hammond, another amazing vid

  • @kriss777faith
    @kriss777faith Před 20 dny

    Fantastic! Finally somebody said it, Jerry Maguire. Long background in utilities and gov enduring ancient insecure versions. Please expand!

  • @DeNikow
    @DeNikow Před 24 dny +1

    Really informative video! I'd like to see more of these and more technical.

  • @NickMaude
    @NickMaude Před 24 dny

    The convincing and planning of the changes needed, is tricky. And then there are the toes the feel they are stepped on by recommending the changes.

  • @HyperDroids
    @HyperDroids Před 24 dny +5

    This video was thoroughly interesting. Hope to see more of it in future.
    Great topics included relationship between NTLM Auth & Kerberos hashing (and dangers associated), EDR efficacy, ADCS, SMB hashing, LSASS, challenges corporate environments face with keeping their systems secure (theory vs practice), pentesting, OT segmentation, PCI compliance & segmentation, and so much more. Well worth watching for security professionals and any security conscious IT engineers.

    • @danktoaster257
      @danktoaster257 Před 24 dny +1

      this is the most AI comment i've seen in awhile. hi gpt-o

    • @HyperDroids
      @HyperDroids Před 24 dny

      @@danktoaster257 Brother, then consider this comment as a CAPTCHA that helps retrain your AI detection software to reduce false-positives.

    • @ShinigamiAnger
      @ShinigamiAnger Před 22 dny

      ​@@HyperDroidslooks like what an AI would respond tbh

  • @you_tube754
    @you_tube754 Před 19 dny

    @John.
    Would you maybe consider make a long video about how a admin can protect the windows systems ?
    Say how to configure windows to be safe against hash collection and pass the hash.
    What gpo need te be in place ... Etc

  • @LazyPlays_
    @LazyPlays_ Před 22 dny +1

    can you do a video on the powershell malware that uses its built-in features to "live off the land"? you can get it from downloading cracked software, i wont comment it but i can tell u privately if you want. you know u have it by checking task scheduler in windows. look for edge or something like that or the file updates.ps1 or update.ps1 etc. it would be a good video and you can explain how to make powershell restricted, and disabled and how to remove most of the danger of it.
    EDIT: also this is one of the many reasons you should never use cracked software, not safe.

  • @DrorDvash
    @DrorDvash Před 24 dny +4

    More of this guy please =) and go more deep into the hands-on side

  • @alaminiumar
    @alaminiumar Před 23 dny

    Always good 🎉❤

  • @KeithGriffiths
    @KeithGriffiths Před 24 dny

    Good video John.

  • @batangx659
    @batangx659 Před 24 dny +1

    JUICE! 😁

  • @henryhuevo
    @henryhuevo Před 23 dny

    I'm just an internal pentester in a web pentesters world :(

  • @user-lz7dc5ef2m
    @user-lz7dc5ef2m Před 24 dny

    Sir number to ip ,fip ,address video please

  • @glodydipanga
    @glodydipanga Před 23 dny

    Hi John i need a mentorship for OSCP PLEASE

    • @smartsalmon1
      @smartsalmon1 Před 23 dny

      When you sign up for the course you get access to offsec discord and OSA. You'll have a ton of support. Someone like John isn't going to have time to mentor you, and as a hacker you need to be able to be fairly autonomous as well

  • @NegussugeN
    @NegussugeN Před 22 dny

    FFS that headphone cable.

  • @wendiriley3271
    @wendiriley3271 Před 23 dny

    Can you do a video on an exploit chain for an android uefi rootkit? I might be able to get you a sample if I can dump it from flash.
    Context:
    I learned (as the victim) of an exploit chain for
    S22, S23, and s24 ultra phones - With no user interaction. That gets ROOT privellege shell acess, all while hiding behind, and not tripping knox.
    It involves accessibility services, for escalation, some recently "(emergency) patched" chrome zero days for initial access,
    "possibly?" Samsungs io_uring implementation for root access, and it seems to use a buffer overflow to install unsigned kernel modules for persistence. As well as attaching itself to your samsung AND google accounts for reinfection.
    Basically this thing is completely nuts, and has ruined 2 of my phones... (using my moms rn😂)
    I've been able to learn alot about how it works generally.
    But, I want to understand it better and see how you would analyze it or look through the exploit chain with your own process.
    As for the sample
    I'm getting set up with an EDL cable, and plan to write all partitions with random data before reformatting and reinstalling.
    I think thatll work

  • @kickeddroid
    @kickeddroid Před 24 dny +1

    The sad part is the reluctance for the industry to secure their shit. And I still can't get a cybersec job. Eternal Blue Really? Lmao

  • @fbifido2
    @fbifido2 Před 24 dny +1

    how about show & tell ???
    just taking about it is ok, but .....

  • @kallikantzaros
    @kallikantzaros Před 23 dny

    6:40 what was that all about LMAO

  • @DarkSeas117
    @DarkSeas117 Před 20 dny

    Who guys are all studying for jobs that dont exist

  • @thomcr
    @thomcr Před 24 dny

    First

  • @InfixLyrics
    @InfixLyrics Před 24 dny +1

    1st comment :D
    like this if you're first ones.

  • @normal47712
    @normal47712 Před 24 dny

    Need more nameyourpricetraining truly awsome and affordable please keep up the support for it