Explore >> Select a destination


You are here

shenaniganslabs.io
| | foxglovesecurity.com
1.8 parsecs away

Travel
| | By @breenmachine Privilege Escalation on Windows 7,8,10, Server 2008, Server 2012... and a new network attack How it works Hot Potato (aka: Potato) takes advantage of known issues in Windows to gain local privilege escalation in default configurations, namely NTLM relay (specifically HTTP->SMB relay) and NBNS spoofing. If this sounds vaguely familiar, it's because a...
| | bogs.io
3.2 parsecs away

Travel
| | An extensive walk-through the popular methods of exploiting SMB using tools such as Metasploit, Reponder, psexec
| | njmulsqb.github.io
3.2 parsecs away

Travel
| | Explore real-world insights from a successful penetration test on an enterprise Active Directory environment. Learn how the domain controllers were compromised within just a few hours using multiple attack vectors. From initial recon to privilege escalation and lateral movement, this case study offers a comprehensive guide to Active Directory security weaknesses and how to fortify them.
| | www.trendmicro.com
18.7 parsecs away

Travel
| We take a closer look at the operations of Clop, a prolific ransomware family that has gained notoriety for its high-profile attacks. We review this ransomware group's constantly changing schemes and discuss how companies can shore up defenses against this threat.