## Занятие 6. Базовые атаки и компрометация доменной Windows-инфраструктуры ### Практическая работа №6.1 Базовые атаки на Windows-инфраструктуру. 1. Провести анализ базы NTDS ![](https://i.imgur.com/6NQ2sj3.png) ![](https://i.imgur.com/MiMjCbQ.png) ![](https://i.imgur.com/zWyszQj.png) ![](https://i.imgur.com/2tE8Tq3.png) ![](https://i.imgur.com/orXdCXu.png) ![](https://i.imgur.com/UZCp29m.png) 2. Выполнить атаку “Path-the-hash” ![](https://i.imgur.com/DXb1U0h.png) ![](https://i.imgur.com/pC9ykXe.png) А при подключении к компьютеру нужно выключать defender ![](https://i.imgur.com/oPzA5s9.png) ![](https://i.imgur.com/U2DgRrk.png) ![](https://i.imgur.com/k7X0Kwg.png) ![](https://i.imgur.com/lErHxOm.png) ![](https://i.imgur.com/hmtNkCl.png) ![](https://i.imgur.com/TjjOzvH.png) ![](https://i.imgur.com/GjaGDLU.png) 3. Реализовать атаки на базовые протоколы Windows responder -I eth0 -A ![](https://i.imgur.com/rBuknup.png) ![](https://i.imgur.com/GLqiQUu.png) responder -I eth0 -wFv ![](https://i.imgur.com/nPpp4zD.png) ![](https://i.imgur.com/rOirEQG.png) mitm6 ![](https://i.imgur.com/53Z3wEr.png) ![](https://i.imgur.com/1X2fsu7.png) ![](https://i.imgur.com/afZe36G.png) ![](https://i.imgur.com/LDWonk7.png) ![](https://i.imgur.com/djRyl6E.png) ### Практическая работа №6.2 Компрометация доменной Windows-инфраструктуры. 2. Провести эксплуатацию уязвимостей контроллера домена ![](https://i.imgur.com/TpKHwLm.png) ![](https://i.imgur.com/5e6pPzF.png) ![](https://i.imgur.com/7kdasRY.png) ![](https://i.imgur.com/kywxavo.png) ![](https://i.imgur.com/SRgnJ99.png) ![](https://i.imgur.com/DUw5wIZ.png) 3. Найти следы эксплуатации уязвимостей ![](https://i.imgur.com/t69RmDZ.png) ![](https://i.imgur.com/xZhX0VX.png) ![](https://i.imgur.com/G62W535.png) ![](https://i.imgur.com/YwWUql3.png) ![](https://i.imgur.com/0rkhP3X.png)