A big shoutout to TCM Security for sponsoring this video. Register now to receive a 50% discount on your first month at the TCM Security Academy, potentially making your most significant step toward a career in ethical hacking. Go here: https://davidbombal.wiki/3vQsqWm

// TCM Security SOCIAL//
LinkedIn : https://www.linkedin.com/company/tcm-security-inc/
Twitter : https://twitter.com/TCMSecurity
YouTube (The Cyber Mentor): https://www.youtube.com/c/TheCyberMentor
Discord: https://discord.com/invite/tcm
Instagram: https://www.instagram.com/tcmsecurity/
Facebook: https://www.facebook.com/tcmsecure/
TikTok: https://www.tiktok.com/@tcmsecurity
Academy Website: https://academy.tcm-sec.com/
TCM Certifications: https://certifications.tcm-sec.com/
Discord: https://discord.com/invite/tcm
Website: https://tcm-sec.com/
Breach Point Website: https://breachpoint.com/

// Heath Adam’s SOCIAL //
LinkedIn: https://www.linkedin.com/in/heathadams/

// Resources REFERENCE //
How to build and active directory hacking lab online: https://youtu.be/xftEuVQ7kY0

// David's SOCIAL //
Discord: https://discord.com/invite/usKSyzb
X: https://www.twitter.com/davidbombal
Instagram: https://www.instagram.com/davidbombal
LinkedIn: https://www.linkedin.com/in/davidbombal
Facebook: https://www.facebook.com/davidbombal.co
TikTok: http://tiktok.com/@davidbombal
YouTube: https://www.youtube.com/@davidbombal

// MY STUFF //
https://www.amazon.com/shop/davidbombal

// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: [email protected]

// MENU //
00:00 - Introduction
01:30 - Labs Options
03:03 - How Do The Labs Work?
04:32 - Where Should You Start?
07:25 - TCM Certifications
09:40 - LLMNR Poisining
13:02 - Lab Example #1 (LLMNR Poisoning)
20:15 - Best Defences
21:01 - LLMNR: Mitigation
23:17 - SMB Relay
27:07 - Lab Example #2 (SMB Relay)
39:43 - When To Run Pentest
41:01 - Is Shell Popping Necessary?
43:43 - Why You Should Have A Pentest
46:09 - SMB Relay Mitigation
48:18 - Lazy Security
49:27 - Favourite Password Manager
50:00 - Gaining Shell Access
51:37 - Is IPv6 Common?
56:08 - Should You Disable IPv6?
57:04 - Do Large Organizations Use IPv6 Properly?
57:33 - Lab Example #3 (IPv6)
01:02:04 - As Administrator
01:06:21 - Pentests Are Important
01:07:30 - IPv6 Mitigation
01:09:56 - Pass The Password / Pass The Hash
01:14:00 - The CME DB
01:14:32 - Lab Example #4 (The CME DB)
01:19:15 - Pass The Hash / Pass the Password Mitigation
01:20:12 - Real World VS CTFs
01:21:35 - Kerberoasting
01:24:11 - Lab Example #5 (Kerberoasting)
01:26:38 - Kerberoasting Mitigation
01:27:50 - Are Window's 'Default Settings' Safe?
01:28:53 - Reach Out to TCM Security
01:29:16 - Real Life Pentest Case Studies
01:35:18 - Lab VS Real World
01:37:15 - How To Access The Internal Network
01:39:30 - Where To Get Started
01:41:11 - Conclusion
01:41:46 - Outro

pentest
pentester
hack
hacker
hacking
ethical hacking
ethical hacker course
ethical hacker
windows ad hacking
microsoft windows
microsoft windows hack
windows 11 hack
windows 11 hacking


Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!

Disclaimer: This video is for educational purposes only.

#hacker #pentester #microsoft