CEH v12: AD Enumeration Mimikatz and Pivoting Techniques

placeholder

Enumerating the Active Directory (AD) during a pentest is important to identify vulnerabilities and attack vectors that may be used to gain unauthorized access to the network.

In this course you will learn about enumeration tools that can help to identify misconfigurations or policy violations that may put the organization at risk. You;ll explore how the mimikatz tool is used to extract sensitive information – such as authentication credentials – from a computer system memory to test its security. Next explore how pivoting is used to gain access to other systems within a network and learn about tools and techniques used for pivoting by ethical hackers.

This course is one in a series that helps to prepare you for the Certified Ethical Hacker v12 (312-50) exam.