1 00:00:00,360 --> 00:00:06,310 So in this way there will be finding user accounts that have these DCC capabilities. 2 00:00:06,330 --> 00:00:10,500 And I would say if you go to Echo, they represent computers. 3 00:00:11,280 --> 00:00:16,770 Right click on this domain object properties and security. 4 00:00:17,930 --> 00:00:22,220 And yet I have already added this dish blue and Bantu. 5 00:00:22,520 --> 00:00:30,890 And if you scroll down and what I can see the replicating directly changes and general so so these settings 6 00:00:30,890 --> 00:00:40,070 were anywhere for this testing user so basically what this setting disease this user can ask for the 7 00:00:40,640 --> 00:00:41,480 control changes. 8 00:00:41,750 --> 00:00:48,230 So is there any changes to dog works then we can fetch the better from the German control. 9 00:00:48,560 --> 00:00:57,940 So this user for that matter, we can fetch the hashes of the users on this moment. 10 00:00:58,580 --> 00:00:59,400 So this. 11 00:01:02,870 --> 00:01:10,560 This is very important to turn this off by default on the enterprise administrators and normal domain 12 00:01:10,580 --> 00:01:11,240 administrators. 13 00:01:11,240 --> 00:01:12,890 How this works. 14 00:01:13,460 --> 00:01:17,450 So far, our lab proposals are did this for this. 15 00:01:20,470 --> 00:01:26,980 So we will be writing this marker to find for all the domains in the current forest. 16 00:01:27,670 --> 00:01:34,930 So when you refer to the current forest so that the forest, a physical forest, not the current forest. 17 00:01:36,270 --> 00:01:38,400 So I have already added these names. 18 00:01:38,400 --> 00:01:41,970 Precious Resource Sector three Icon Management and Access Control. 19 00:01:44,860 --> 00:01:53,140 And the domains themselves that are the domains in the current forest and here are considered in the 20 00:01:53,140 --> 00:01:54,190 peace burn collection. 21 00:02:01,220 --> 00:02:04,880 And I got look for this for each domain. 22 00:02:05,330 --> 00:02:07,670 Be in domains. 23 00:02:08,910 --> 00:02:10,710 I can just bring day. 24 00:02:11,280 --> 00:02:14,270 So this week you made the actual domain name. 25 00:02:16,560 --> 00:02:24,260 So that says strong domain name is equal to being the name that whose string. 26 00:02:27,650 --> 00:02:30,170 So this would you give me actual domain my name? 27 00:02:30,170 --> 00:02:31,990 In our case, it's taxation. 28 00:02:32,000 --> 00:02:33,380 I'm not local. 29 00:02:35,040 --> 00:02:37,400 I will need to convert this in both distinguished fund. 30 00:02:38,690 --> 00:02:43,810 I also will be only binding this to taxation in that oracle. 31 00:02:43,870 --> 00:02:52,280 We are not, uh, enumerate are this if you buy into this and you can build such a but finally to find 32 00:02:52,280 --> 00:02:59,180 all of that works and this taxation and so on it be specifically verifiable. 33 00:02:59,180 --> 00:03:02,030 But regarding that with all the information. 34 00:03:05,940 --> 00:03:11,910 So we need to add the DC as equals to DC as equals to here and here. 35 00:03:12,300 --> 00:03:16,260 So that's just a domain name, but. 36 00:03:17,950 --> 00:03:25,380 So I'm going to split using the dart so I going get full values that is text and rocker. 37 00:03:25,390 --> 00:03:29,950 So I'm going to store them in string at a string business. 38 00:03:32,980 --> 00:03:38,840 And further into our easy questions, you know, are you just there in business? 39 00:03:41,110 --> 00:03:43,060 I guess so. 40 00:03:43,060 --> 00:03:54,470 What I'm going to do is I got these new nine and roll razor elements in this edit I want to add, uh, 41 00:03:54,490 --> 00:03:58,360 DC equals two and DC equals two. 42 00:04:00,350 --> 00:04:03,910 I want to prepare this value so I can do business. 43 00:04:03,920 --> 00:04:06,840 Our fight is equal to disease. 44 00:04:07,430 --> 00:04:07,730 Sorry. 45 00:04:10,000 --> 00:04:13,630 DC is eager to press DC softly. 46 00:04:13,960 --> 00:04:15,190 So this will do me. 47 00:04:17,260 --> 00:04:27,070 But with these values now I can join these elements using the string that joint seconds and string domain 48 00:04:27,070 --> 00:04:28,360 be an easy to. 49 00:04:31,540 --> 00:04:32,530 String. 50 00:04:34,510 --> 00:04:35,740 Spring the join. 51 00:04:37,300 --> 00:04:38,810 So it takes two parameters. 52 00:04:38,830 --> 00:04:41,800 One is operator so you want to join these elements? 53 00:04:42,640 --> 00:04:52,030 I want to show come because that we are going to use this for the added up binding and the spring edit. 54 00:04:52,060 --> 00:04:53,770 So that is my basis. 55 00:05:00,160 --> 00:05:01,330 So this will give me. 56 00:05:08,240 --> 00:05:13,850 So did you give me the actual million so I can easily bring the to. 57 00:05:20,090 --> 00:05:26,480 So what we're going to do is I'm going to write a function that is sinking this and it takes the domain 58 00:05:26,480 --> 00:05:26,780 name. 59 00:05:28,510 --> 00:05:33,010 So strong, reserved and also declared a spring writer. 60 00:05:35,470 --> 00:05:36,280 As W. 61 00:05:42,000 --> 00:05:44,540 So I have created this, uh, hash table. 62 00:05:45,200 --> 00:05:46,020 Uh, I will. 63 00:05:46,020 --> 00:05:48,360 Explaining after we run this program. 64 00:05:50,850 --> 00:05:53,210 So we got the domain being well. 65 00:05:53,220 --> 00:05:58,530 So let's go into a directory and play the music. 66 00:05:58,800 --> 00:06:01,770 You know, there are plenty of elder. 67 00:06:03,240 --> 00:06:03,810 Plus. 68 00:06:05,500 --> 00:06:06,160 Domaine de. 69 00:06:08,260 --> 00:06:10,900 Now we need to share that researcher. 70 00:06:11,950 --> 00:06:21,430 We are going to use this should be dataset defined are the objects new that it researcher and we use 71 00:06:21,640 --> 00:06:26,320 that searchable as you can study so from the root of this. 72 00:06:28,290 --> 00:06:31,240 And in our brain, we are going to search all the objects. 73 00:06:34,280 --> 00:06:34,580 Okay. 74 00:06:34,730 --> 00:06:36,950 So we can check for each of. 75 00:06:38,730 --> 00:06:39,690 Search results. 76 00:06:40,590 --> 00:06:42,150 SRN be a start. 77 00:06:42,570 --> 00:06:43,390 Find out. 78 00:06:43,650 --> 00:06:44,820 So it will give me. 79 00:06:44,820 --> 00:06:49,450 Are the decks under this up further? 80 00:06:53,620 --> 00:06:54,910 So if you give me argon. 81 00:06:55,210 --> 00:06:56,740 So what I want to do is. 82 00:06:56,740 --> 00:06:57,970 I want to find. 83 00:07:01,720 --> 00:07:05,170 So Act two, directory security. 84 00:07:06,070 --> 00:07:08,170 So this is the class we're going to use. 85 00:07:08,530 --> 00:07:13,690 And here it has the function that is get access rules. 86 00:07:17,140 --> 00:07:24,370 So first we need to get the object should be an object from this one so we can test, start up, get 87 00:07:24,370 --> 00:07:24,980 better trained. 88 00:07:25,570 --> 00:07:29,550 So this will bring me the three and three. 89 00:07:29,740 --> 00:07:30,510 It set them. 90 00:07:34,700 --> 00:07:36,590 And then not object security. 91 00:07:36,590 --> 00:07:40,760 So this will do me the dish act laboratory security object. 92 00:07:44,930 --> 00:07:47,690 So we can set a new. 93 00:07:52,460 --> 00:07:59,450 Battery security that serious is equal to ten brand security. 94 00:08:02,820 --> 00:08:06,090 Now I can find 80 years to get access to stuff. 95 00:08:06,780 --> 00:08:09,380 So we are going to send through. 96 00:08:10,560 --> 00:08:14,680 We are also on the inhibitor to once through. 97 00:08:16,320 --> 00:08:18,270 And then I just want to bring a piece of. 98 00:08:20,330 --> 00:08:24,090 We are going to see tape of anti-American. 99 00:08:25,930 --> 00:08:32,870 So first, if you want to find using the seed, you need to see a type of security identifier first. 100 00:08:32,890 --> 00:08:42,970 I have tried to access the user seed and I'm going to convert the seed for the branding form and that 101 00:08:42,970 --> 00:08:46,120 wormy row which I was unable to. 102 00:08:46,120 --> 00:08:53,200 So so let's say we are going to search all these objects and find using this and we are going. 103 00:08:54,850 --> 00:08:59,700 So this will bring me the ordination guru collection organization. 104 00:09:00,610 --> 00:09:01,520 Crew collection? 105 00:09:01,600 --> 00:09:01,980 Yeah. 106 00:09:02,020 --> 00:09:11,980 Since you construed this one and I can loop over this other radiation blows so far, each affecting 107 00:09:12,010 --> 00:09:16,390 better tree access here. 108 00:09:16,420 --> 00:09:20,170 And I sort of say yeah in our. 109 00:09:23,310 --> 00:09:25,260 So these rules are. 110 00:09:32,860 --> 00:09:35,790 So this is an access control entry. 111 00:09:37,160 --> 00:09:42,800 So these are these access control entries combined are called access control. 112 00:09:43,250 --> 00:09:48,500 So these are called, uh, most conditional access controls. 113 00:09:49,070 --> 00:09:53,180 And you'll be having this if you click on it once. 114 00:09:55,060 --> 00:09:55,900 WEBBER Auditing. 115 00:09:55,900 --> 00:09:57,160 So auditing is done. 116 00:09:57,430 --> 00:10:08,260 Circle Uh, this will determine whatever, uh, when you have success, uh, should we have an internal 117 00:10:08,260 --> 00:10:08,860 audit? 118 00:10:09,400 --> 00:10:13,060 So based upon your permissions and auditing. 119 00:10:13,300 --> 00:10:17,290 So the it takes place. 120 00:10:18,760 --> 00:10:19,690 Access control. 121 00:10:22,780 --> 00:10:26,020 So for each of these rules, what we're going to do is. 122 00:10:27,680 --> 00:10:29,930 We're going to put into the object a. 123 00:10:34,530 --> 00:10:37,590 So we have the object tape of the tape. 124 00:10:39,550 --> 00:10:44,890 So this object type will be in the form of this one access control types. 125 00:10:45,390 --> 00:10:48,470 So search like this and you get this access control rights. 126 00:10:49,810 --> 00:10:58,960 So here you can see the, uh, the spec brigadier and for this, uh, access control, you can see if 127 00:10:58,960 --> 00:11:02,320 you scroll down here, you have the application that changes. 128 00:11:02,320 --> 00:11:10,380 And the changes also make sure to begin about this, we are going to enumerate our objects and find 129 00:11:10,400 --> 00:11:14,470 if there are any in that matches this Berati. 130 00:11:17,830 --> 00:11:19,780 So that's why I have created a hashtag. 131 00:11:20,050 --> 00:11:21,550 It's a simple dictionary. 132 00:11:22,680 --> 00:11:23,370 And the key. 133 00:11:23,580 --> 00:11:33,810 You know, what I want to do is I want to bring all of the users that are having the is in this hash 134 00:11:33,810 --> 00:11:34,140 table. 135 00:11:34,590 --> 00:11:36,780 So again so far each of. 136 00:11:39,480 --> 00:11:44,010 Dictionary and be in it to. 137 00:11:45,300 --> 00:11:50,240 So I can report this using the beta key and direct value. 138 00:11:51,670 --> 00:11:55,750 If been out very dark spring. 139 00:11:56,410 --> 00:11:57,940 The question is the question. 140 00:11:58,450 --> 00:12:02,050 You had that object I dug to scream. 141 00:12:02,920 --> 00:12:12,640 So what I'm doing here is I'm taking each of you and checking the current objects, current factors, 142 00:12:12,640 --> 00:12:14,700 Rosemary, if there is any match. 143 00:12:14,700 --> 00:12:19,600 So that means this search result to help the. 144 00:12:21,790 --> 00:12:25,240 The project has this permission and a. 145 00:12:31,560 --> 00:12:34,290 So we can say I started out right, Lane. 146 00:12:36,980 --> 00:12:43,940 You know, you can first then build your identity reference. 147 00:12:44,300 --> 00:12:51,950 So it is identity differences which object to how the access on this technician and that local. 148 00:12:53,790 --> 00:12:56,130 So this year, we we're going to print the first. 149 00:12:57,150 --> 00:12:57,350 Yes. 150 00:12:57,470 --> 00:12:57,970 Tell me that. 151 00:12:58,640 --> 00:12:59,000 Right. 152 00:12:59,010 --> 00:12:59,250 Right. 153 00:13:00,480 --> 00:13:05,400 So our next one, we are going to print this year, not object. 154 00:13:07,330 --> 00:13:07,660 Thank. 155 00:13:13,080 --> 00:13:14,340 And the Iraqi. 156 00:13:19,680 --> 00:13:23,410 So you can also into other values as well. 157 00:13:23,430 --> 00:13:26,670 You can also print actor territory, right? 158 00:13:26,880 --> 00:13:32,730 So this will put into the general clients and write back rates. 159 00:13:35,000 --> 00:13:37,250 So for now, let's print these three. 160 00:13:46,180 --> 00:13:46,630 Okay. 161 00:13:52,510 --> 00:13:54,710 So we're going to be done by spring. 162 00:13:54,730 --> 00:13:58,890 So let's say the third is equals two. 163 00:13:59,200 --> 00:14:03,620 So this spring, writer, how are the farm spring. 164 00:14:03,670 --> 00:14:06,580 So we can send a similar posting and return. 165 00:14:06,580 --> 00:14:07,120 It is a. 166 00:14:20,190 --> 00:14:20,610 Sorry. 167 00:14:20,610 --> 00:14:21,480 This is spring. 168 00:14:22,020 --> 00:14:22,410 Okay. 169 00:14:23,070 --> 00:14:29,460 Now we have the domain audience, so we are going to create a trade first. 170 00:14:29,490 --> 00:14:33,270 Before that, we are going to create an object for this class. 171 00:14:33,360 --> 00:14:34,860 The class name is program. 172 00:14:41,140 --> 00:14:46,870 So we can create a thread thread using physical store to know. 173 00:14:49,060 --> 00:14:53,890 So we are going to execute the function that is. 174 00:14:57,140 --> 00:14:58,250 The return. 175 00:14:59,790 --> 00:15:04,800 We need to spur in some desert spring CMBS equestrian testing. 176 00:15:06,380 --> 00:15:14,390 So whatever the function is returning, we are going to appended to the comment variable and we can 177 00:15:14,390 --> 00:15:15,170 speed up. 178 00:15:15,650 --> 00:15:17,300 Get busy single yourself. 179 00:15:18,530 --> 00:15:19,580 But might be an. 180 00:15:24,600 --> 00:15:27,360 And B.C. singer Bart Starr. 181 00:15:27,750 --> 00:15:29,010 So this is the thread. 182 00:15:29,430 --> 00:15:31,050 And we are so sure, but. 183 00:15:32,220 --> 00:15:36,270 She join so that our main trade we were posted in. 184 00:15:38,290 --> 00:15:44,140 All these trade, uh, stops executing after completion of this trade. 185 00:15:44,200 --> 00:15:47,350 The main trade, our main program get resumed. 186 00:15:48,280 --> 00:15:49,690 Now we can put into the. 187 00:15:53,460 --> 00:15:54,720 We can put into here. 188 00:16:00,330 --> 00:16:01,450 So I think we have. 189 00:16:03,590 --> 00:16:04,520 Then Katrina. 190 00:16:15,020 --> 00:16:16,280 So let's go and run this one. 191 00:16:19,200 --> 00:16:21,830 And here we can see we've got so many reserves. 192 00:16:22,480 --> 00:16:25,920 That's because we're really fighting for all of the objects. 193 00:16:26,940 --> 00:16:28,260 We need to centre first. 194 00:16:28,710 --> 00:16:34,080 We need to apply the filter that is built by Charbonnet. 195 00:16:34,140 --> 00:16:34,740 So. 196 00:16:40,750 --> 00:16:45,960 Uh, to your template name. 197 00:16:48,020 --> 00:16:52,340 We consider Domaine de Domaine de in their contents. 198 00:16:52,670 --> 00:16:58,300 So we are awaiting the BCG to back each nine. 199 00:16:58,310 --> 00:17:00,230 And this is the question. 200 00:17:00,560 --> 00:17:02,000 This is my Domaine de Mille. 201 00:17:02,480 --> 00:17:07,840 And if it contains this current object, the value. 202 00:17:08,150 --> 00:17:15,530 So that means if we have some taxes nine related winery, we are going to put into these values. 203 00:17:16,870 --> 00:17:18,730 Emperor name. 204 00:17:29,850 --> 00:17:32,730 So let's compare this one and best here. 205 00:17:34,410 --> 00:17:35,400 Let's go and run this. 206 00:17:37,360 --> 00:17:44,260 And here we can see we got the government address and the object community. 207 00:17:46,890 --> 00:17:48,030 And here you can see. 208 00:17:50,030 --> 00:17:57,430 Bowman controllers and you can see how these changes are end changes and I saw that. 209 00:17:58,760 --> 00:18:01,850 So that's what the properties. 210 00:18:02,340 --> 00:18:12,020 And I'm going to unpick this changes for the test so that's going to play a note on this one. 211 00:18:12,950 --> 00:18:16,160 And one can see we do not get the result of that. 212 00:18:16,580 --> 00:18:18,130 We only get the result of one to. 213 00:18:22,250 --> 00:18:26,510 So we can also pull the trigger here. 214 00:18:27,020 --> 00:18:29,330 If there are any errors, we can just simply. 215 00:18:58,290 --> 00:18:58,710 Okay. 216 00:18:58,710 --> 00:19:01,590 So we are getting the result for the user. 217 00:19:01,860 --> 00:19:10,230 So if you have like 20 AR 15 users, uh, you need to definitely run the breakdown to get all the data. 218 00:19:10,500 --> 00:19:13,380 So this is the, uh, shortcut way to get there. 219 00:19:14,040 --> 00:19:16,920 This, this is, uh, capabilities of the user. 220 00:19:23,530 --> 00:19:30,130 So I am on this the Bucs Bucs sonar this how this the attack. 221 00:19:31,540 --> 00:19:40,420 So I have already got the user access using this I correct the password and if you run the bread home, 222 00:19:41,050 --> 00:19:43,860 you need to run the wooden piece. 223 00:19:44,590 --> 00:19:46,210 You get some credentials. 224 00:19:47,240 --> 00:19:56,510 So after running the blackout, it turns out that as you see run manager how these changes are permission. 225 00:19:59,070 --> 00:20:03,170 So I have copied this binary to this and we can just push. 226 00:20:04,630 --> 00:20:05,380 The binary. 227 00:20:09,240 --> 00:20:10,830 So we can set PowerShell. 228 00:20:12,310 --> 00:20:13,070 The report. 229 00:20:24,530 --> 00:20:26,390 Then she's not easy. 230 00:20:30,540 --> 00:20:32,070 And you should see that request. 231 00:20:32,760 --> 00:20:34,560 And now let's go and run this one. 232 00:20:42,620 --> 00:20:48,080 So we got this error, the special directory service attribute that does not exist. 233 00:20:48,470 --> 00:20:54,890 So what we're going to do is we're going to come on a few print statements. 234 00:21:09,020 --> 00:21:10,400 It's no for this. 235 00:22:19,420 --> 00:22:24,490 So I think the difficulty is not a for small gets. 236 00:22:26,110 --> 00:22:27,340 So now let's. 237 00:22:30,240 --> 00:22:31,020 Copy this. 238 00:22:43,520 --> 00:22:48,160 And now you can see we got the upper hand here. 239 00:22:48,170 --> 00:22:52,880 You can see us using on manager to have the replication genius out. 240 00:22:54,140 --> 00:23:00,630 Now you can get some idea that we need to flush more by this user to perform this business.