All Projects → whitehat-zero → DEFCON25_Attack_Defend_ActiveDirectory_Workshop

whitehat-zero / DEFCON25_Attack_Defend_ActiveDirectory_Workshop

Licence: BSD-3-Clause license
Workshop Materials from DEFCON 25 (7/27/2017)

Projects that are alternatives of or similar to DEFCON25 Attack Defend ActiveDirectory Workshop

ucsunivention
⚫ Curso GRÁTIS SAMBA-4 UCS Univention Core Free 5.x Domain Controller Active Directory Open Source
Stars: ✭ 29 (+52.63%)
Mutual labels:  active-directory, domain-controller
ActiveDirectoryCSDsc
DSC resources for installing or uninstalling Active Directory Certificate Services components in Windows Server.
Stars: ✭ 45 (+136.84%)
Mutual labels:  active-directory
Zbang
zBang is a risk assessment tool that detects potential privileged account threats
Stars: ✭ 224 (+1078.95%)
Mutual labels:  active-directory
PSPasswordExpiryNotifications
Following PowerShell Module provides different approach to scheduling password notifications for expiring Active Directory based accounts. While most of the scripts require knowledge on HTML... this one is just one config file and a bit of tingling around with texts. Whether this is good or bad it's up to you to decide. I do plan to add an optio…
Stars: ✭ 38 (+100%)
Mutual labels:  active-directory
Testimo
Testimo is PowerShell module for running health checks for Active Directory (and later on any other server type) against a bunch of different tests
Stars: ✭ 249 (+1210.53%)
Mutual labels:  active-directory
passport-activedirectory
Active Directory strategy for passport.js
Stars: ✭ 28 (+47.37%)
Mutual labels:  active-directory
Ad Password Protection
Active Directory password filter featuring breached password checking and custom complexity rules
Stars: ✭ 210 (+1005.26%)
Mutual labels:  active-directory
awesome-cybersecurity-blueteam-cn
网络安全 · 攻防对抗 · 蓝队清单,中文版
Stars: ✭ 494 (+2500%)
Mutual labels:  attack-defense
ansible-role-system ldap
Configures SSSD to authenticate against AD's LDAP endpoints
Stars: ✭ 31 (+63.16%)
Mutual labels:  active-directory
Avorix-Domain-Controller
A Raspberry Pi based Active Directory Domain Controller developed for business and education.
Stars: ✭ 28 (+47.37%)
Mutual labels:  domain-controller
requests auth
Authentication classes to be used with requests
Stars: ✭ 28 (+47.37%)
Mutual labels:  active-directory
Adtimeline
Timeline of Active Directory changes with replication metadata
Stars: ✭ 252 (+1226.32%)
Mutual labels:  active-directory
FindUncommonShares
FindUncommonShares.py is a Python equivalent of PowerView's Invoke-ShareFinder.ps1 allowing to quickly find uncommon shares in vast Windows Domains.
Stars: ✭ 186 (+878.95%)
Mutual labels:  active-directory
Paw
Stars: ✭ 243 (+1178.95%)
Mutual labels:  active-directory
Pro-GNN
Implementation of the KDD 2020 paper "Graph Structure Learning for Robust Graph Neural Networks"
Stars: ✭ 202 (+963.16%)
Mutual labels:  attack-defense
Ad Ldap Enum
An LDAP based Active Directory user and group enumeration tool
Stars: ✭ 223 (+1073.68%)
Mutual labels:  active-directory
ActiveDirectoryEnumeration
Enumerate AD through LDAP with a collection of helpfull scripts being bundled
Stars: ✭ 127 (+568.42%)
Mutual labels:  active-directory
active-directory-lookup
Simplest Java API (and CLI) for authenticating and searching in Active Directory
Stars: ✭ 15 (-21.05%)
Mutual labels:  active-directory
ctf-gameserver
FAUST Gameserver for attack-defense CTFs
Stars: ✭ 38 (+100%)
Mutual labels:  attack-defense
RapidRepoPull
The goal of this program is to quickly pull and install repos from its list
Stars: ✭ 40 (+110.53%)
Mutual labels:  active-directory

DEFCON 25 Workshop

Attacking Active Directory and Advanced Methods of Defense

This hands on workshop teaches you how to both attack and defend Active Directory. We will start by deploying an Active Directory environment using the typical security settings found in most medium to large organizations. Participants will then learn current common methods and tools used to exploit Active Directory against their test environments. Participants will create a hardened Active Directory environment using advanced methods to secure domain controllers from attack and then try to compromise their hardened environments.

Presented on 7/27/2017
Instructors: Adam Steed, Andrew Allen, Zachary Davis
Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].