|
You are here |
blog.oddbit.com | ||
| | | | |
daenney.github.io
|
|
| | | | | I blog about what catches my fancy | |
| | | | |
passing-the-hash.blogspot.com
|
|
| | | | | So one of my favorite techniques on the Windows side is to use what Benjamin Delpy (@gentilkiwi) called 'overpass the hash' to get a legit K... | |
| | | | |
blog.xpnsec.com
|
|
| | | | | In this post we will be exploring another "roasting" method which involves exploiting a weak account configuration setting in Active Directory.. AS-REP Roasting. | |
| | | | |
gabevenberg.com
|
|
| | | I've been using Arch Linux for several years now. Of course, my first installs were... blunderous, as i wanted to do full disk encryption from the get-go, and I didn't know what I was doing. After those first one or two installs, I generally settled on LVM on LUKS with a GRUB bootloader and my swap on an LVM volume, mostly because it makes it much easier to setup hibernation/suspend to disk vs, say, a swap file. | ||