O'Reilly logo

Mastering Kali Linux for Advanced Penetration Testing - Second Edition by Vijay Kumar Velu

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Setting up a virtual network with Active Directory

As we progress in building our own verification lab, the majority of the corporate companies utilize the Microsoft Active Directory for user administrative management and resource sharing such as printers, files, and identity management. Attackers are no longer interested in just running the command on the server or shutting it down, they are now more focused on owning a full domain controller that can potentially be the DNA of a company. We will perform some advanced attacks on Active Directory and the DNS server. In this section, we will install Active Directory on the Windows 2008 R2 server.

We will perform the same steps that we performed to install the Kali Linux to install Windows 2008 ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required