--- title: Windows_Basic-Кандала_Кирилл-Практика-6 --- ___ # Практика №6. (Базовые атаки и компрометация доменной Windows-инфраструктуры) ___ # №6.1 Базовые атаки на Windows-инфраструктуру. ___ ## Часть 1. Анализ базы NTDS #### 1.1 ![](https://i.imgur.com/I6GJ7nX.png) #### 1.2 ![](https://i.imgur.com/hMeEivz.png) #### 1.3 ![](https://i.imgur.com/222U4X0.png) ## Часть 2. Path-the-hash #### 2.1 ![](https://i.imgur.com/De3d9Iu.png) #### 2.2 ![](https://i.imgur.com/v1DlFL9.png) ![](https://i.imgur.com/n7QhZCY.png) ![](https://i.imgur.com/RDTqejY.png) ![](https://i.imgur.com/pVVHwe4.png) ![](https://i.imgur.com/q3gy8Yz.png) ## Часть 3. Атаки на базовые протоколы Windows ![](https://i.imgur.com/ZZpfYDS.png) ![](https://i.imgur.com/QkhWoBp.png) ![](https://i.imgur.com/ei5oZJg.jpg) ![](https://i.imgur.com/uZFh2aC.png) ![](https://i.imgur.com/bV677jQ.png) ![](https://i.imgur.com/LvUQEji.jpg) ___ # №6.2 Компрометация доменной Windows-инфраструктуры. ___ ![](https://i.imgur.com/n7kdpVU.png) ## Часть 2. Эксплуатация уязвимостей контроллера доменa #### 2.1 - 2.2 ![](https://i.imgur.com/mT0DrPX.png) #### 2.3 ![](https://i.imgur.com/hhu3If3.png) #### 2.4 ![](https://i.imgur.com/pxZGuhy.jpg) ## 2.5 - 2.8 ![](https://i.imgur.com/NvzPlPU.png) ![](https://i.imgur.com/lKxdeAo.png) ## Часть 3. Поиск следов эксплуатации уязвимостей #### 3.1 ![](https://i.imgur.com/7VyrlYT.png) ![](https://i.imgur.com/4cdUV49.png) ![](https://i.imgur.com/McKZuG5.png) ![](https://i.imgur.com/8ehht4b.png)