You're reading from Password Cracking with Kali Linux
Lab Setup
For the lab setup I used Kali Linux 2023, Windows 11, Windows Server 2022, and Metasploitable2 in VMWare. The systems were setup so all could communicate together. The Windows Server was setup as a Domain Controller and then modified with SecFrame’s “Bad Blood” to add thousands of unsecure Active Directory Objects. For those who have read my other books, this is the exact same lab setup.
As Bad Blood creates random users and objects every time you run it, you will never have the exact same Active Directory environment as the one I use in this book. But the concepts and techniques are solid, you should be able to run the commands on any current Windows Server lab target system with similar results – as long as you have permission to do so.
I cover creating a testing lab in my Basic Security Testing with Kali Linux book. I cover setting up Windows Server 2022 and BadBlood in my Advanced Security Testing with Kali Linux book. Just make sure...
The rest of the page is locked
You have been reading a chapter from
Password Cracking with Kali LinuxPublished in: Feb 2024Publisher: PacktISBN-13: 9781835888544
© 2024 Packt Publishing Limited All Rights Reserved