We may earn an affiliate commission when you visit our partners.
Lee Allen

Among other features, Mimikatz provides lateral movement capabilities such as pass the hash, user impersonation, and the creation of golden and silver tickets. Skill up your lateral movement techniques with Mimikatz.

Read more

Among other features, Mimikatz provides lateral movement capabilities such as pass the hash, user impersonation, and the creation of golden and silver tickets. Skill up your lateral movement techniques with Mimikatz.

Would you like to move from system to system without clear text credentials? How about impersonating a domain controller to inject data of your choosing? In this course, Lateral Movement with Mimikatz 2, you will learn how to leverage the advanced lateral movement capabilities of the open-source Mimikatz project towards post-exploitation activities. First, you will see how to 'Pass the Hash' to authenticate without the need of a clear text password. Next, you will discover how Mimikatz is used to bypass the domain controllers with 'Pass the Ticket'. Finally, you will explore how to create golden and silver tickets to impersonate domain users and service accounts. When finished with this course, you will have the skills and knowledge of the open-source Mimikatz tool needed to emulate lateral movement techniques aligned with Mitre ATT&CK.

Enroll now

Here's a deal for you

We found an offer that may be relevant to this course.
Save money when you learn. All coupon codes, vouchers, and discounts are applied automatically unless otherwise noted.

What's inside

Syllabus

Tool Introduction
Lateral Movement and Defense Evasion with Mimikatz
Resources

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Explores advanced lateral movement techniques with Mimikatz for post-exploitation activities
Provides hands-on experience with pass the hash, user impersonation, and creating golden and silver tickets
Led by experienced instructors in the field of cybersecurity
Relevant for penetration testers and ethical hackers seeking to enhance their lateral movement skills
Requires prior knowledge and experience in cybersecurity concepts and tools
May involve the use of specialized software and tools that require a subscription

Save this course

Save Lateral Movement with Mimikatz 2 to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Lateral Movement with Mimikatz 2 with these activities:
Form a study group with classmates
Enhance learning through peer collaboration and support
Show steps
  • Identify classmates who are interested in forming a study group
  • Establish a regular meeting schedule and agenda
  • Discuss course materials, share insights, and work on assignments together
Review concepts of Active Directory
Understand the role of Active Directory in lateral movement
Browse courses on Active Directory
Show steps
  • Review the basics of Active Directory, including domains, forests, and organizational units
  • Understand how users and computers are authenticated and authorized in Active Directory
  • Review the different types of Active Directory attacks, including pass-the-hash and pass-the-ticket
Follow tutorials on Mimikatz usage
Gain practical experience using Mimikatz
Browse courses on Mimikatz
Show steps
  • Find reputable online tutorials that provide step-by-step instructions on using Mimikatz
  • Follow the tutorials and practice using Mimikatz in a safe and controlled environment
  • Experiment with different Mimikatz commands and techniques to gain a better understanding of its capabilities
Five other activities
Expand to see all activities and additional details
Show all eight activities
Create a knowledge base on Mimikatz
Build a resource that consolidates your understanding of Mimikatz
Browse courses on Mimikatz
Show steps
  • Gather materials from the course, tutorials, and other sources on Mimikatz
  • Organize the materials into a logical structure, such as a notebook or wiki
  • Add your own notes and insights to the knowledge base as you learn more about Mimikatz
Practice lateral movement techniques
Develop proficiency in executing lateral movement techniques
Browse courses on Lateral Movement
Show steps
  • Set up a test environment where you can safely practice lateral movement techniques
  • Practice using Mimikatz to perform pass-the-hash and pass-the-ticket attacks
  • Experiment with different lateral movement techniques to improve your understanding of how they work
Write a technical article on Mimikatz
Reinforce your knowledge by explaining concepts to others
Browse courses on Mimikatz
Show steps
  • Choose a specific topic related to Mimikatz that you want to write about
  • Research the topic thoroughly and gather relevant information
  • Organize your thoughts and outline the structure of your article
  • Write the article, ensuring clarity, accuracy, and technical depth
Contribute to Mimikatz development
Gain a deeper understanding of Mimikatz by contributing to its development
Browse courses on Mimikatz
Show steps
  • Familiarize yourself with the Mimikatz source code and development process
  • Identify an area where you can contribute, such as improving documentation, fixing bugs, or adding new features
  • Submit a pull request to the Mimikatz repository on GitHub
Participate in security research or ethical hacking projects
Gain practical experience and contribute to the security community
Show steps
  • Identify organizations or projects that are involved in security research or ethical hacking
  • Reach out to these organizations and express your interest in volunteering
  • Contribute your skills and knowledge to ongoing projects or participate in bug bounty programs

Career center

Learners who complete Lateral Movement with Mimikatz 2 will develop knowledge and skills that may be useful to these careers:
Penetration Tester
Penetration Testers assess and evaluate the security of computer systems and networks, identifying potential vulnerabilities that could be exploited by malicious actors. The Lateral Movement with Mimikatz 2 course aligns perfectly with the responsibilities of Penetration Testers, as it provides hands-on experience with advanced lateral movement techniques. By gaining proficiency in Mimikatz, Penetration Testers can enhance their ability to simulate real-world attacks, uncover security weaknesses, and provide comprehensive recommendations for improving an organization's security posture.
Security Researcher
Security Researchers identify and analyze new vulnerabilities and threats, and develop innovative solutions to protect against them. The Lateral Movement with Mimikatz 2 course can be highly beneficial for Security Researchers, as it provides in-depth knowledge of advanced lateral movement techniques and their implications for cybersecurity. By mastering Mimikatz, Security Researchers can enhance their ability to uncover new vulnerabilities, develop more effective detection and prevention mechanisms, and contribute to the overall advancement of cybersecurity practices.
Cybersecurity Consultant
Cybersecurity Consultants provide expert advice and guidance to organizations seeking to strengthen their cybersecurity defenses. The Lateral Movement with Mimikatz 2 course can be highly beneficial for Cybersecurity Consultants, as it equips them with specialized knowledge in advanced lateral movement techniques. This course empowers Cybersecurity Consultants to better understand the tactics employed by malicious actors and develop more effective strategies for mitigating threats. By incorporating Mimikatz into their skill set, Cybersecurity Consultants can enhance their ability to assess vulnerabilities, implement security controls, and advise clients on best practices for maintaining a robust security posture.
Information Security Analyst
Information Security Analysts are responsible for safeguarding an organization's sensitive data and systems from unauthorized access, threats, and vulnerabilities. Taking the Lateral Movement with Mimikatz 2 course can significantly enhance the skill set of Information Security Analysts, providing them with in-depth knowledge of lateral movement techniques and how to defend against them. By mastering the concepts covered in the course, Information Security Analysts can stay ahead of evolving threats and ensure the integrity and confidentiality of their organization's information assets.
Incident Responder
Incident Responders are responsible for responding to and mitigating cybersecurity incidents. The Lateral Movement with Mimikatz 2 course can provide Incident Responders with valuable hands-on experience in dealing with advanced lateral movement techniques. By mastering Mimikatz, Incident Responders can enhance their ability to quickly identify and contain threats, minimize the impact of incidents, and restore normal operations.
Network Security Engineer
Network Security Engineers design, implement, and maintain an organization's network security infrastructure. The Lateral Movement with Mimikatz 2 course can enhance the skills of Network Security Engineers by providing them with a comprehensive understanding of advanced lateral movement techniques. By mastering Mimikatz, Network Security Engineers can gain the ability to simulate real-world attacks, identify potential vulnerabilities in their network infrastructure, and implement effective measures to mitigate threats. The course's focus on defense evasion is particularly valuable for Network Security Engineers, as it empowers them to stay ahead of attackers and protect their networks from compromise.
Cloud Security Engineer
Cloud Security Engineers design, implement, and maintain security measures for cloud-based systems and services. The Lateral Movement with Mimikatz 2 course can enhance the skills of Cloud Security Engineers by providing them with a comprehensive understanding of advanced lateral movement techniques in the cloud environment. By mastering Mimikatz, Cloud Security Engineers can gain the ability to simulate real-world attacks, identify potential vulnerabilities in their cloud infrastructure, and implement effective measures to mitigate threats.
Security Auditor
Security Auditors assess and evaluate an organization's security posture, identifying potential vulnerabilities and recommending improvements. The Lateral Movement with Mimikatz 2 course can provide Security Auditors with valuable insights into advanced lateral movement techniques and their implications for security auditing. By mastering Mimikatz, Security Auditors can enhance their ability to evaluate the effectiveness of existing security measures, identify potential vulnerabilities, and provide more comprehensive and actionable recommendations for improving an organization's security posture.
Security Architect
Security Architects design and implement comprehensive security solutions to protect an organization's information and systems. The Lateral Movement with Mimikatz 2 course can be a valuable addition to the skill set of Security Architects, as it provides in-depth knowledge of advanced lateral movement techniques and their implications for security architecture. By mastering Mimikatz, Security Architects can enhance their ability to evaluate the effectiveness of existing security measures, identify potential vulnerabilities, and develop more robust and resilient security architectures.
Cybersecurity Manager
Cybersecurity Managers oversee and manage an organization's cybersecurity program, ensuring its effectiveness and alignment with business objectives. The Lateral Movement with Mimikatz 2 course can provide Cybersecurity Managers with valuable insights into advanced lateral movement techniques and their implications for managing cybersecurity. By mastering Mimikatz, Cybersecurity Managers can enhance their ability to evaluate the effectiveness of existing security measures, identify potential vulnerabilities, and make more informed decisions about resource allocation and strategic planning for cybersecurity.
Malware Analyst
Malware Analysts investigate and analyze malicious software to understand its behavior, impact, and potential threats. The Lateral Movement with Mimikatz 2 course can provide Malware Analysts with valuable insights into the advanced techniques used by malware to move laterally within a network. By mastering Mimikatz, Malware Analysts can gain a deeper understanding of malware's capabilities, enabling them to develop more effective detection and mitigation strategies. The course's focus on post-exploitation activities is particularly relevant for Malware Analysts, as it provides a comprehensive view of how malware operates once it has gained a foothold in a system.
Cyber Threat Intelligence Analyst
Cyber Threat Intelligence Analysts collect, analyze, and interpret data to identify and assess potential cyber threats. The Lateral Movement with Mimikatz 2 course can provide Cyber Threat Intelligence Analysts with valuable insights into the tactics, techniques, and procedures used by malicious actors to move laterally within a network. By mastering Mimikatz, Cyber Threat Intelligence Analysts can gain a deeper understanding of the threat landscape and develop more effective strategies for detecting and mitigating threats.
Digital Forensics Analyst
Digital Forensics Analysts investigate and analyze digital devices to uncover evidence of cybercrimes. The Lateral Movement with Mimikatz 2 course can be a valuable addition to the skill set of Digital Forensics Analysts, as it provides in-depth knowledge of advanced lateral movement techniques and their implications for digital forensics. By mastering Mimikatz, Digital Forensics Analysts can enhance their ability to identify and extract evidence of malicious activity, even in cases where attackers have attempted to cover their tracks.
Systems Analyst
Systems Analysts play a crucial role in the cybersecurity landscape, designing and implementing security measures to protect organizations from threats. The Lateral Movement with Mimikatz 2 course can provide a valuable foundation for those aspiring to become Systems Analysts, equipping them with the skills needed to enhance their organization's security posture. The course's focus on advanced lateral movement techniques, such as Pass the Hash and Pass the Ticket, is crucial for understanding how attackers operate and developing effective defenses against their tactics.
Risk Analyst
Risk Analysts identify, assess, and mitigate risks to an organization's information and systems. The Lateral Movement with Mimikatz 2 course can provide Risk Analysts with valuable insights into advanced lateral movement techniques and their implications for risk management. By mastering Mimikatz, Risk Analysts can enhance their ability to evaluate the potential impact of threats, develop more effective risk mitigation strategies, and make more informed decisions about resource allocation for security.

Reading list

We've selected nine books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Lateral Movement with Mimikatz 2.
Provides a comprehensive overview of the internal workings of Windows, including the file system, memory management, and security. It will be helpful for understanding the technical concepts behind the lateral movement techniques covered in the course.
Provides a comprehensive overview of the internal workings of Windows, including the file system, memory management, and security. It will be helpful for understanding the technical concepts behind the lateral movement techniques covered in the course.
Provides a comprehensive overview of computer networking, which is essential for understanding how **Mimikatz** can be used to move laterally through a network.
Covers a wide range of topics related to web application security, including authentication, authorization, and data protection. It will be helpful for understanding the potential security risks associated with lateral movement.
Provides a comprehensive guide to network security assessment, including vulnerability scanning and penetration testing. It will be helpful for understanding how to identify and mitigate security risks that could be exploited for lateral movement.
Provides insights into the psychology of social engineering and how attackers can use it to gain access to sensitive information. It will be helpful for understanding the importance of human factors in lateral movement.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Lateral Movement with Mimikatz 2.
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser