Explore >> Select a destination


You are here

blog.oddbit.com
| | daenney.github.io
2.8 parsecs away

Travel
| | I blog about what catches my fancy
| | passing-the-hash.blogspot.com
3.4 parsecs away

Travel
| | So one of my favorite techniques on the Windows side is to use what Benjamin Delpy (@gentilkiwi) called 'overpass the hash' to get a legit K...
| | blog.xpnsec.com
2.6 parsecs away

Travel
| | In this post we will be exploring another "roasting" method which involves exploiting a weak account configuration setting in Active Directory.. AS-REP Roasting.
| | gabevenberg.com
18.5 parsecs away

Travel
| I've been using Arch Linux for several years now. Of course, my first installs were... blunderous, as i wanted to do full disk encryption from the get-go, and I didn't know what I was doing. After those first one or two installs, I generally settled on LVM on LUKS with a GRUB bootloader and my swap on an LVM volume, mostly because it makes it much easier to setup hibernation/suspend to disk vs, say, a swap file.