This is the Windows app named vulnerable-AD whose latest release can be downloaded as vulnerable-ADsourcecode.tar.gz. It can be run online in the free hosting provider OnWorks for workstations.
Download and run online this app named vulnerable-AD with OnWorks for free.
Ikut arahan ini untuk menjalankan apl ini:
- 1. Memuat turun aplikasi ini dalam PC anda.
- 2. Masukkan dalam pengurus fail kami https://www.onworks.net/myfiles.php?username=XXXXX dengan nama pengguna yang anda mahukan.
- 3. Muat naik aplikasi ini dalam pengurus filem tersebut.
- 4. Mulakan mana-mana emulator dalam talian OS OnWorks daripada tapak web ini, tetapi emulator dalam talian Windows yang lebih baik.
- 5. Daripada OS Windows OnWorks yang baru anda mulakan, pergi ke pengurus fail kami https://www.onworks.net/myfiles.php?username=XXXX dengan nama pengguna yang anda mahukan.
- 6. Muat turun aplikasi dan pasangnya.
- 7. Muat turun Wine dari repositori perisian pengedaran Linux anda. Setelah dipasang, anda kemudian boleh mengklik dua kali aplikasi untuk menjalankannya dengan Wine. Anda juga boleh mencuba PlayOnLinux, antara muka mewah melalui Wine yang akan membantu anda memasang program dan permainan Windows yang popular.
Wain ialah cara untuk menjalankan perisian Windows pada Linux, tetapi tanpa Windows diperlukan. Wain ialah lapisan keserasian Windows sumber terbuka yang boleh menjalankan program Windows secara langsung pada mana-mana desktop Linux. Pada asasnya, Wine cuba untuk melaksanakan semula Windows yang mencukupi dari awal supaya ia boleh menjalankan semua aplikasi Windows tersebut tanpa memerlukan Windows.
SKRIN
Ad
terdedah-AD
DESCRIPTION
Vulnerable-AD is a PowerShell toolkit that automates the creation of a deliberately insecure Active Directory domain for hands-on labs and testing. It builds a domain controller (or augments an existing AD installation) with a variety of common misconfigurations and intentional weaknesses so practitioners can exercise attack techniques such as Kerberoast, AS-REP roast, DCSync, Pass-the-Hash, Silver/Golden Ticket attacks, and more. The project can create user objects with default or weak passwords, inject passwords into object descriptions, disable SMB signing, and manipulate ACLs to reproduce real-world privilege escalation and persistence scenarios. A convenience wrapper and examples make it straightforward to deploy in a local lab: you can install AD services, run the script on a domain controller, and generate hundreds of vulnerable accounts and conditions for testing. The repository emphasizes full coverage of the listed attack types and includes options to randomize which weakness
Ciri-ciri
- One-command lab bootstrap that installs AD roles and seeds vulnerable objects
- Randomized vulnerability generation so each deployment presents different attack paths
- Preconfigured scenarios for popular attacks: Kerberoasting, AS-REP, DCSync, Pass-the-Hash, Silver/Golden Tickets
- Options to create users with default passwords and inject credentials into object descriptions for easy discovery
- Configurable scope (number of users, groups, and workstations) to scale lab complexity
- Safe-use guidance and explicit warnings to restrict execution to isolated lab environments
Bahasa Pengaturcaraan
PowerShell
Kategori
This is an application that can also be fetched from https://sourceforge.net/projects/vulnerable-ad.mirror/. It has been hosted in OnWorks in order to be run online in an easiest way from one of our free Operative Systems.