Information Technology
Star icon
Most Popular
Hands on Training icon
Hands On Training
Star icon
Hands on Training icon

Privilege Escalation with Rubeus

Course Cover
compare button icon

Course Features

icon

Duration

20 minutes

icon

Delivery Method

Online

icon

Available on

Downloadable Courses

icon

Accessibility

Desktop, Laptop

icon

Language

English

icon

Subtitles

English

icon

Level

Intermediate

icon

Teaching Type

Self Paced

icon

Video Content

20 minutes

Course Description

Red team engagements have one goal: admin-level domain access. In highly-patched environments, it is often difficult to escalate your privileges via vulnerability exploitation. This course, Privilege Elevation with Rubeus will show you how to obtain admin credentials using two well-known attacks on active directory domains: Kerberoasting, and AS-REP Roasting. You will first learn how to use Rubeus to extract hashed credentials to perform a Kerberoasting operation. You will then learn how to extract even more credentials by using the AS-REP method. You will also learn how to crack hashed passwords with Hashcat. This course covers three key tactics of the Mitre Att&ck framework. Access Token Manipulation, Kerberoasting, and AS-REP roasting (T1558.004).

Course Overview

projects-img

International Faculty

projects-img

Post Course Interactions

projects-img

Instructor-Moderated Discussions

projects-img

Case Studies, Captstone Projects

Skills You Will Gain

What You Will Learn

003) and AS-REP Roasting (T1558

004)

Finally, you will explore how to crack those hashed passwords using Hashcat

Then, you will see how to harvest even more hashed credentials using the AS-REP technique

This course covers three important tactics from the Mitre Att&ck framework Access Token Manipulation (T1134), Kerberoasting (T1558

You will learn how to harvest hashed credentials using Rubeus to execute a Kerberoasting attack

Course Cover