|
You are here |
blog.oddbit.com | ||
| | | | |
nbailey.ca
|
|
| | | | | Kubernetes is our generation's Asbestos. | |
| | | | |
blog.xpnsec.com
|
|
| | | | | In this post we will be exploring another "roasting" method which involves exploiting a weak account configuration setting in Active Directory.. AS-REP Roasting. | |
| | | | |
passing-the-hash.blogspot.com
|
|
| | | | | So one of my favorite techniques on the Windows side is to use what Benjamin Delpy (@gentilkiwi) called 'overpass the hash' to get a legit K... | |
| | | | |
sqlstudies.com
|
|
| | | Sometimes you have a requirement to grant permissions to every database on an instance. Historically this has required creating a user (database level principal) on each database and granting it the correct permission. And making sure to grant those permissions to the model database so that future databases have the correct permission as they are... | ||