SlideShare une entreprise Scribd logo
1  sur  66
Building Active
Directory Lab for
Red Teaming
#whoami
👉 Chirag Savla
👉 Twitter – @chiragsavla94
👉 Interest area – Red
Teaming, Application
Security, Penetration
Testing
2
Blog – https://3xpl01tc0d3r.blogspot.com
“
Prevention is ideal, detection is a must
What is Active Directory ?
▸ Active Directory is a directory service that
centralizes the management of users, computers
and other objects within a network. Its primary
function is to authenticate and authorize users and
computers in a windows domain.
4
What is Active Directory ?
5
What is Forest?
6
rtlabs.local
sales.rtlabs.local accounts.rtlabs.local
techno.local
dev.techno.local sec.techno.local
Domain Tree
Domain Forest
= Groups
= Organizational Unit
= Domain
Trust Relationship
= Users / Groups
Active Directory Components
▸ Forest
▸ Domain Trees
▸ Domains
▸ Schema
▸ Objects
▹ Organizational Units (OUs)
▹ Groups
▹ Users
▹ Computer
▸ Sites
▸ Global Catalog (GC)
▸ Group Policy
▸ Domain Trust
7
Forest
▸ An Active Directory forest (AD forest) is the top
most logical container in an Active Directory
configuration that contains domains, users,
computers, and group policies.
8
Domain Tree
▸ When you add a child domain to a parent domain
you create what is called a domain tree. A domain
tree is just a series of domains connected together
in a hierarchical fashion all using the same DNS
namespace.
9
Domain
▸ The domain is a logical structure of containers and
objects within Active Directory. A domain contains
the following components:
▹ A hierarchical structure for users, groups, computers and other
objects
▹ Security services that provide authentication and authorization
to resources in the domain and other domains
▹ Policies that are applied to users and computers
▹ A DNS name to identify the domain. When you log into a
computer that is part of a domain you are logging into the DNS
domain name.
10
Schema
▸ The Active Directory schema defines every object
class that can be created and used in an Active
Directory forest. It also defines every attribute that
can exist in an object. In other words, it is a
blueprint of how data can be stored in Active
Directory.
11
Object
▸ Objects are defined as a group of attributes that
represent a resource in the domain. These objects
are assigned a unique security identifier (SID) that
is used to grant or deny the object access to
resources in the domain.
12
Organizational Units (OUs)
▸ An OU is a container object that can contain
different objects from the same domain. You will
use OUs to store and organize, user accounts,
contacts, computers, and groups. You will also link
group policy objects to an OU.
13
Groups
▸ There are two types of objects, a Security group,
and a distribution group. A security group is a
grouping of users accounts that can be used to
provide access to resources. Distribution groups
are used for email distribution lists.
14
Users
▸ A domain user is one whose username and
password are stored on a domain controller rather
than the computer the user is logging into.
▸ User accounts are used to gain access to the
domain resources.
15
Computer
▸ Each domain-joined computer has an account in
AD DS. Computer accounts are used in the same
ways that user accounts are used for users. Each
computer has a Security Identification (SID) and
attributes. when you create a domain, a Computers
container is created.
16
Sites
▸ A site is a collection of subnets. The Active
Directory sites help define the replication flow and
resource location for clients such as a domain
controller.
17
Global Catalog (GC)
▸ The global catalog server contains a full replica of
all objects and is used to perform forest wide
searches. By default the first domain controller in a
domain is designated as the GC server.
18
Group Policy
▸ Group policy allows you to centrally manage user
and computer settings. You can use group policy to
set password policies, auditing policies, lock
screen, map drives, deploy software, one drive,
office 365 settings and much more.
19
Domain Trust
▸ In an AD environment, trust is a relationship
between two domains or forests which allows users
of one domain or forest to access resources in the
other domain or forest.
▸ Trust can be automatic (parent-child, same forest
etc.) or established (forest, external).
▸ Trusted Domain Objects (TDOs) represent the trust
relationships in a domain.
20
Domain Trust
▸ In an AD environment, trust is a relationship
between two domains or forests which allows users
of one domain or forest to access resources in the
other domain or forest.
▸ Trust can be automatic (parent-child, same forest
etc.) or established (forest, external).
▸ Trusted Domain Objects (TDOs) represent the trust
relationships in a domain.
21
Domain Trust
▸ Trust Direction
▹ One-way trust – Unidirectional. Users in the trusted domain can
access resources in the trusting domain but the reverse is not
true.
▹ Two-way trust – Bi-directional. Users of both domains can
access resources in the other domain.
22
Domain Trust
▸ Trust Direction
▹ One-way trust – Unidirectional. Users in the trusted domain can
access resources in the trusting domain but the reverse is not
true.
▹ Two-way trust – Bi-directional. Users of both domains can
access resources in the other domain.
23
Domain Trust
24
rtlabs.local techno.local
Trust Relationship
One-way trust
Direction of Trust
Direction of Access
Domain Trust
25
rtlabs.local techno.local
Trust Relationship
Two-way trust
Domain Trust
▸ Trust Transitivity
▹ Transitive – Can be extended to establish trust relationships
with other domains. All the default intra-forest trust relationships
(Tree-root, ParentChild) between domains within a same forest
are transitive two-way trusts.
▹ Nontransitive – Cannot be extended to other domains in the
forest. Can be two-way or one-way. This is the default trust
(called external trust) between two domains in different forests
when forests do not have a trust relationship.
26
Domain Trust
27
Domain A
Transitive
Domain C
Domain B
Domain Trust
28
Domain A
Nontransitive
Domain CDomain B
Domain Trust
▸ Default/Automatic Trusts –
▹ Parent-child trust – It is created automatically between the new
domain and the domain that precedes it in the namespace
hierarchy, whenever a new domain is added in a tree. For
example, sales.rtlabs.local is a child of rtlabs.local. This trust is
always two-way transitive.
▹ Tree-root trust – It is created automatically between whenever a
new domain tree is added to a forest root. This trust is always
two-way transitive.
29
Domain Trust
30
Parent-child trust
techno.local
dev.techno.local sec.techno.local
Domain Trust
31
Tree-root trust
techno.local
dev.techno.local sec.techno.local
sec.rtcloud.local
aws.sec.rtcloud.local
Domain Trust
▸ Shortcut Trusts – Used to reduce access times in complex trust
scenarios. Can be one-way or two-way transitive.
▸ External Trusts – Between two domains in different forests when
forests do not have a trust relationship. Can be one-way or two-way
and is nontransitive.
▸ Forest Trusts – Between forest root domain. Cannot be extended to
a third forest (no implicit trust). Can be one-way or two-way and
transitive or nontransitive.
32
Domain Trust
33
Shortcut Trusts
techno.local
dev.techno.local sec.techno.local
sec.rtcloud.local
aws.sec.rtcloud.local
Domain Trust
34
External Trusts
rtlabs.local
sales.rtlabs.local accounts.rtlabs.local sec.techno.local
techno.local
Two-Way External Trust
One-Way External Trust
Domain Trust
35
Forest Trusts
rtlabs.local techno.local consult.local
Forest trust Forest trust
Setup Active Directory
36
Setup Active Directory
37
Setup Active Directory
38
Setup Active Directory
39
Setup Active Directory
40
Setup Active Directory
41
Setup Active Directory
42
Setup Active Directory
43
Setup Active Directory
44
Setup Active Directory
45
Setup Active Directory
46
Setup Active Directory
47
Setup Active Directory
48
Setup Active Directory
49
Setup Active Directory
50
Setup Active Directory
51
Setup Active Directory
52
Setup Active Directory
53
Setup Active Directory
54
Setup Active Directory
55
Setup Active Directory
56
Setup Active Directory
57
Integrate Client Machine
58
Integrate Client Machine
59
Integrate Client Machine
60
Integrate Client Machine
61
Integrate Client Machine
62
Integrate Client Machine
63
Credits
Thanks to @NullMumbai for granting me the privilege
to present.
64
Reference
▸ https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-
2003/cc780036(v=ws.10)
▸ https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-
2003/cc773178(v=ws.10)
▸ https://activedirectorypro.com/glossary/
▸ https://adsecurity.org/
65
66
THANKS!
Any questions?
You can find me at @chiragsavla94

Contenu connexe

Tendances

Secure by Design - Security Design Principles for the Rest of Us
Secure by Design - Security Design Principles for the Rest of UsSecure by Design - Security Design Principles for the Rest of Us
Secure by Design - Security Design Principles for the Rest of UsEoin Woods
 
Introduction to Tenable
Introduction to TenableIntroduction to Tenable
Introduction to TenableBharat Jindal
 
Cyber 101: An introduction to privileged access management
Cyber 101: An introduction to privileged access managementCyber 101: An introduction to privileged access management
Cyber 101: An introduction to privileged access managementseadeloitte
 
MITRE-Module 2 Slides.pdf
MITRE-Module 2 Slides.pdfMITRE-Module 2 Slides.pdf
MITRE-Module 2 Slides.pdfReZa AdineH
 
EDR vs SIEM - The fight is on
EDR vs SIEM - The fight is onEDR vs SIEM - The fight is on
EDR vs SIEM - The fight is onJustin Henderson
 
PaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPrime Infoserv
 
AMSI: How Windows 10 Plans to Stop Script-Based Attacks and How Well It Does It
AMSI: How Windows 10 Plans to Stop Script-Based Attacks and How Well It Does ItAMSI: How Windows 10 Plans to Stop Script-Based Attacks and How Well It Does It
AMSI: How Windows 10 Plans to Stop Script-Based Attacks and How Well It Does ItNikhil Mittal
 
5 Steps to a Zero Trust Network - From Theory to Practice
5 Steps to a Zero Trust Network - From Theory to Practice5 Steps to a Zero Trust Network - From Theory to Practice
5 Steps to a Zero Trust Network - From Theory to PracticeAlgoSec
 
Tenable Solutions for Enterprise Cloud Security
Tenable Solutions for Enterprise Cloud SecurityTenable Solutions for Enterprise Cloud Security
Tenable Solutions for Enterprise Cloud SecurityMarketingArrowECS_CZ
 
Introduction To Vulnerability Assessment & Penetration Testing
Introduction To Vulnerability Assessment & Penetration TestingIntroduction To Vulnerability Assessment & Penetration Testing
Introduction To Vulnerability Assessment & Penetration TestingRaghav Bisht
 
Welcome to the Jungle: Pentesting AWS
Welcome to the Jungle: Pentesting AWSWelcome to the Jungle: Pentesting AWS
Welcome to the Jungle: Pentesting AWSMike Felch
 
Cloud Security Architecture.pptx
Cloud Security Architecture.pptxCloud Security Architecture.pptx
Cloud Security Architecture.pptxMoshe Ferber
 
Top 20 Security Controls for a More Secure Infrastructure
Top 20 Security Controls for a More Secure InfrastructureTop 20 Security Controls for a More Secure Infrastructure
Top 20 Security Controls for a More Secure InfrastructureInfosec
 
Privileged Access Management - 2016
Privileged Access Management - 2016Privileged Access Management - 2016
Privileged Access Management - 2016Lance Peterman
 
Threat Hunting - Moving from the ad hoc to the formal
Threat Hunting - Moving from the ad hoc to the formalThreat Hunting - Moving from the ad hoc to the formal
Threat Hunting - Moving from the ad hoc to the formalPriyanka Aash
 

Tendances (20)

Secure by Design - Security Design Principles for the Rest of Us
Secure by Design - Security Design Principles for the Rest of UsSecure by Design - Security Design Principles for the Rest of Us
Secure by Design - Security Design Principles for the Rest of Us
 
Introduction to Tenable
Introduction to TenableIntroduction to Tenable
Introduction to Tenable
 
Oscp preparation
Oscp preparationOscp preparation
Oscp preparation
 
Cyber 101: An introduction to privileged access management
Cyber 101: An introduction to privileged access managementCyber 101: An introduction to privileged access management
Cyber 101: An introduction to privileged access management
 
OSSIM Overview
OSSIM OverviewOSSIM Overview
OSSIM Overview
 
MITRE-Module 2 Slides.pdf
MITRE-Module 2 Slides.pdfMITRE-Module 2 Slides.pdf
MITRE-Module 2 Slides.pdf
 
IBM Security QRadar
 IBM Security QRadar IBM Security QRadar
IBM Security QRadar
 
Security Information and Event Managemen
Security Information and Event ManagemenSecurity Information and Event Managemen
Security Information and Event Managemen
 
EDR vs SIEM - The fight is on
EDR vs SIEM - The fight is onEDR vs SIEM - The fight is on
EDR vs SIEM - The fight is on
 
PaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPaloAlto Enterprise Security Solution
PaloAlto Enterprise Security Solution
 
AMSI: How Windows 10 Plans to Stop Script-Based Attacks and How Well It Does It
AMSI: How Windows 10 Plans to Stop Script-Based Attacks and How Well It Does ItAMSI: How Windows 10 Plans to Stop Script-Based Attacks and How Well It Does It
AMSI: How Windows 10 Plans to Stop Script-Based Attacks and How Well It Does It
 
5 Steps to a Zero Trust Network - From Theory to Practice
5 Steps to a Zero Trust Network - From Theory to Practice5 Steps to a Zero Trust Network - From Theory to Practice
5 Steps to a Zero Trust Network - From Theory to Practice
 
Breach and attack simulation tools
Breach and attack simulation toolsBreach and attack simulation tools
Breach and attack simulation tools
 
Tenable Solutions for Enterprise Cloud Security
Tenable Solutions for Enterprise Cloud SecurityTenable Solutions for Enterprise Cloud Security
Tenable Solutions for Enterprise Cloud Security
 
Introduction To Vulnerability Assessment & Penetration Testing
Introduction To Vulnerability Assessment & Penetration TestingIntroduction To Vulnerability Assessment & Penetration Testing
Introduction To Vulnerability Assessment & Penetration Testing
 
Welcome to the Jungle: Pentesting AWS
Welcome to the Jungle: Pentesting AWSWelcome to the Jungle: Pentesting AWS
Welcome to the Jungle: Pentesting AWS
 
Cloud Security Architecture.pptx
Cloud Security Architecture.pptxCloud Security Architecture.pptx
Cloud Security Architecture.pptx
 
Top 20 Security Controls for a More Secure Infrastructure
Top 20 Security Controls for a More Secure InfrastructureTop 20 Security Controls for a More Secure Infrastructure
Top 20 Security Controls for a More Secure Infrastructure
 
Privileged Access Management - 2016
Privileged Access Management - 2016Privileged Access Management - 2016
Privileged Access Management - 2016
 
Threat Hunting - Moving from the ad hoc to the formal
Threat Hunting - Moving from the ad hoc to the formalThreat Hunting - Moving from the ad hoc to the formal
Threat Hunting - Moving from the ad hoc to the formal
 

Similaire à Building active directory lab for red teaming

RUNNING HEAD DOMAIN STRUCTURE DESIGNDOMAIN STRUCTURE DESIGN.docx
RUNNING HEAD DOMAIN STRUCTURE DESIGNDOMAIN STRUCTURE DESIGN.docxRUNNING HEAD DOMAIN STRUCTURE DESIGNDOMAIN STRUCTURE DESIGN.docx
RUNNING HEAD DOMAIN STRUCTURE DESIGNDOMAIN STRUCTURE DESIGN.docxcharisellington63520
 
Administer Active Directory
Administer Active DirectoryAdminister Active Directory
Administer Active DirectoryHameda Hurmat
 
Active Directory for Auditors
Active Directory for AuditorsActive Directory for Auditors
Active Directory for AuditorsAndrew Clark
 
Windows Network concepts
Windows Network conceptsWindows Network concepts
Windows Network conceptsDuressa Teshome
 
Microsoft Active Directory
Microsoft Active DirectoryMicrosoft Active Directory
Microsoft Active Directorythebigredhemi
 
Active directory job_interview_preparation_guide
Active directory job_interview_preparation_guideActive directory job_interview_preparation_guide
Active directory job_interview_preparation_guideabdulkalamattari
 
Hunt for Domain Controller : Active Directory Pentesting Session
Hunt for Domain Controller : ActiveDirectory Pentesting SessionHunt for Domain Controller : ActiveDirectory Pentesting Session
Hunt for Domain Controller : Active Directory Pentesting Sessionhacknpentest
 
Activedirecotryfundamentals
ActivedirecotryfundamentalsActivedirecotryfundamentals
ActivedirecotryfundamentalsShekhar Singh
 
Intro to Big Data Hadoop
Intro to Big Data HadoopIntro to Big Data Hadoop
Intro to Big Data HadoopApache Apex
 
Active directory domain and trust
Active  directory  domain  and  trustActive  directory  domain  and  trust
Active directory domain and trustproser tech
 
Active directory installation windows 2003 1
Active directory installation windows 2003 1Active directory installation windows 2003 1
Active directory installation windows 2003 1tameemyousaf
 
2.1 users & groups
2.1 users & groups2.1 users & groups
2.1 users & groupsMuuluu
 
Security and LDAP integration in InduSoft Web Studio
Security and LDAP integration in InduSoft Web StudioSecurity and LDAP integration in InduSoft Web Studio
Security and LDAP integration in InduSoft Web StudioAVEVA
 
Introduction to Distributed System
Introduction to Distributed SystemIntroduction to Distributed System
Introduction to Distributed SystemRKGhosh3
 
proposed solution to resource sharing and security against unauthorize.docx
proposed solution to resource sharing and security against unauthorize.docxproposed solution to resource sharing and security against unauthorize.docx
proposed solution to resource sharing and security against unauthorize.docxtodd921
 

Similaire à Building active directory lab for red teaming (20)

RUNNING HEAD DOMAIN STRUCTURE DESIGNDOMAIN STRUCTURE DESIGN.docx
RUNNING HEAD DOMAIN STRUCTURE DESIGNDOMAIN STRUCTURE DESIGN.docxRUNNING HEAD DOMAIN STRUCTURE DESIGNDOMAIN STRUCTURE DESIGN.docx
RUNNING HEAD DOMAIN STRUCTURE DESIGNDOMAIN STRUCTURE DESIGN.docx
 
Administer Active Directory
Administer Active DirectoryAdminister Active Directory
Administer Active Directory
 
Active directory 101
Active directory 101Active directory 101
Active directory 101
 
Active Directory for Auditors
Active Directory for AuditorsActive Directory for Auditors
Active Directory for Auditors
 
Windows Network concepts
Windows Network conceptsWindows Network concepts
Windows Network concepts
 
Microsoft Active Directory
Microsoft Active DirectoryMicrosoft Active Directory
Microsoft Active Directory
 
Active directory job_interview_preparation_guide
Active directory job_interview_preparation_guideActive directory job_interview_preparation_guide
Active directory job_interview_preparation_guide
 
Hunt for Domain Controller : Active Directory Pentesting Session
Hunt for Domain Controller : ActiveDirectory Pentesting SessionHunt for Domain Controller : ActiveDirectory Pentesting Session
Hunt for Domain Controller : Active Directory Pentesting Session
 
Activedirecotryfundamentals
ActivedirecotryfundamentalsActivedirecotryfundamentals
Activedirecotryfundamentals
 
Intro to Big Data Hadoop
Intro to Big Data HadoopIntro to Big Data Hadoop
Intro to Big Data Hadoop
 
Active directory domain and trust
Active  directory  domain  and  trustActive  directory  domain  and  trust
Active directory domain and trust
 
Active directory installation windows 2003 1
Active directory installation windows 2003 1Active directory installation windows 2003 1
Active directory installation windows 2003 1
 
2.1 users & groups
2.1 users & groups2.1 users & groups
2.1 users & groups
 
Security and LDAP integration in InduSoft Web Studio
Security and LDAP integration in InduSoft Web StudioSecurity and LDAP integration in InduSoft Web Studio
Security and LDAP integration in InduSoft Web Studio
 
Active directory
Active directoryActive directory
Active directory
 
Computer Science Homework Help
Computer Science Homework HelpComputer Science Homework Help
Computer Science Homework Help
 
Presentation gggffggggg.pdf
Presentation                     gggffggggg.pdfPresentation                     gggffggggg.pdf
Presentation gggffggggg.pdf
 
Introduction to Distributed System
Introduction to Distributed SystemIntroduction to Distributed System
Introduction to Distributed System
 
proposed solution to resource sharing and security against unauthorize.docx
proposed solution to resource sharing and security against unauthorize.docxproposed solution to resource sharing and security against unauthorize.docx
proposed solution to resource sharing and security against unauthorize.docx
 
Security for Big Data
Security for Big DataSecurity for Big Data
Security for Big Data
 

Plus de n|u - The Open Security Community

Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...n|u - The Open Security Community
 

Plus de n|u - The Open Security Community (20)

Hardware security testing 101 (Null - Delhi Chapter)
Hardware security testing 101 (Null - Delhi Chapter)Hardware security testing 101 (Null - Delhi Chapter)
Hardware security testing 101 (Null - Delhi Chapter)
 
Osint primer
Osint primerOsint primer
Osint primer
 
SSRF exploit the trust relationship
SSRF exploit the trust relationshipSSRF exploit the trust relationship
SSRF exploit the trust relationship
 
Nmap basics
Nmap basicsNmap basics
Nmap basics
 
Metasploit primary
Metasploit primaryMetasploit primary
Metasploit primary
 
Api security-testing
Api security-testingApi security-testing
Api security-testing
 
Introduction to TLS 1.3
Introduction to TLS 1.3Introduction to TLS 1.3
Introduction to TLS 1.3
 
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
 
Talking About SSRF,CRLF
Talking About SSRF,CRLFTalking About SSRF,CRLF
Talking About SSRF,CRLF
 
Owning a company through their logs
Owning a company through their logsOwning a company through their logs
Owning a company through their logs
 
Introduction to shodan
Introduction to shodanIntroduction to shodan
Introduction to shodan
 
Cloud security
Cloud security Cloud security
Cloud security
 
Detecting persistence in windows
Detecting persistence in windowsDetecting persistence in windows
Detecting persistence in windows
 
Frida - Objection Tool Usage
Frida - Objection Tool UsageFrida - Objection Tool Usage
Frida - Objection Tool Usage
 
OSQuery - Monitoring System Process
OSQuery - Monitoring System ProcessOSQuery - Monitoring System Process
OSQuery - Monitoring System Process
 
DevSecOps Jenkins Pipeline -Security
DevSecOps Jenkins Pipeline -SecurityDevSecOps Jenkins Pipeline -Security
DevSecOps Jenkins Pipeline -Security
 
Extensible markup language attacks
Extensible markup language attacksExtensible markup language attacks
Extensible markup language attacks
 
Linux for hackers
Linux for hackersLinux for hackers
Linux for hackers
 
Android Pentesting
Android PentestingAndroid Pentesting
Android Pentesting
 
News bytes null 200314121904
News bytes null 200314121904News bytes null 200314121904
News bytes null 200314121904
 

Dernier

4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Association for Project Management
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSMae Pangan
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmStan Meyer
 
Scientific Writing :Research Discourse
Scientific  Writing :Research  DiscourseScientific  Writing :Research  Discourse
Scientific Writing :Research DiscourseAnita GoswamiGiri
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 
MS4 level being good citizen -imperative- (1) (1).pdf
MS4 level   being good citizen -imperative- (1) (1).pdfMS4 level   being good citizen -imperative- (1) (1).pdf
MS4 level being good citizen -imperative- (1) (1).pdfMr Bounab Samir
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxGrade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxkarenfajardo43
 
Multi Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP ModuleMulti Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP ModuleCeline George
 
Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1GloryAnnCastre1
 
week 1 cookery 8 fourth - quarter .pptx
week 1 cookery 8  fourth  -  quarter .pptxweek 1 cookery 8  fourth  -  quarter .pptx
week 1 cookery 8 fourth - quarter .pptxJonalynLegaspi2
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDecoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDhatriParmar
 
4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptxmary850239
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
 

Dernier (20)

4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHS
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and Film
 
Scientific Writing :Research Discourse
Scientific  Writing :Research  DiscourseScientific  Writing :Research  Discourse
Scientific Writing :Research Discourse
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 
MS4 level being good citizen -imperative- (1) (1).pdf
MS4 level   being good citizen -imperative- (1) (1).pdfMS4 level   being good citizen -imperative- (1) (1).pdf
MS4 level being good citizen -imperative- (1) (1).pdf
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxGrade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
 
Faculty Profile prashantha K EEE dept Sri Sairam college of Engineering
Faculty Profile prashantha K EEE dept Sri Sairam college of EngineeringFaculty Profile prashantha K EEE dept Sri Sairam college of Engineering
Faculty Profile prashantha K EEE dept Sri Sairam college of Engineering
 
Multi Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP ModuleMulti Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP Module
 
Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1
 
week 1 cookery 8 fourth - quarter .pptx
week 1 cookery 8  fourth  -  quarter .pptxweek 1 cookery 8  fourth  -  quarter .pptx
week 1 cookery 8 fourth - quarter .pptx
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDecoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
 
4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
prashanth updated resume 2024 for Teaching Profession
prashanth updated resume 2024 for Teaching Professionprashanth updated resume 2024 for Teaching Profession
prashanth updated resume 2024 for Teaching Profession
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
 

Building active directory lab for red teaming