Skip to Content
The Art of Network Penetration Testing
book

The Art of Network Penetration Testing

by Royce Davis
December 2020
Intermediate to advanced
304 pages
8h 57m
English
Manning Publications
Content preview from The Art of Network Penetration Testing

10 Controlling the entire network

This chapter covers

  • Identifying domain admin users
  • Locating systems with domain admin users logged in
  • Enumerating domain controller volume shadow copies (VSS)
  • Stealing ntds.dit from VSS
  • Extracting Active Directory password hashes from ntds.dit

It’s time to explain the final step in the post-exploitation and privilege-escalation phase of an internal network penetration test (INTP). That, of course, is to take complete control of the enterprise network by gaining domain admin privileges in Active Directory. Domain admin users can log in to any machine on the network, provided the machine is managed through Active Directory. If an attacker manages to gain domain admin privileges on an enterprise network, the ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Penetration Testing

Penetration Testing

Georgia Weidman
Penetration Testing: A Survival Guide

Penetration Testing: A Survival Guide

Wolf Halton, Bo Weaver, Juned Ahmed Ansari, Srinivasa Rao Kotipalli, Mohammed A. Imran

Publisher Resources

ISBN: 9781617296826Supplemental ContentPublisher SupportOtherPublisher WebsiteSupplemental ContentPurchase Link