Explore >> Select a destination


You are here

shenaniganslabs.io
| | njmulsqb.github.io
3.2 parsecs away

Travel
| | Explore real-world insights from a successful penetration test on an enterprise Active Directory environment. Learn how the domain controllers were compromised within just a few hours using multiple attack vectors. From initial recon to privilege escalation and lateral movement, this case study offers a comprehensive guide to Active Directory security weaknesses and how to fortify them.
| | foxglovesecurity.com
1.8 parsecs away

Travel
| | By @breenmachine Privilege Escalation on Windows 7,8,10, Server 2008, Server 2012... and a new network attack How it works Hot Potato (aka: Potato) takes advantage of known issues in Windows to gain local privilege escalation in default configurations, namely NTLM relay (specifically HTTP->SMB relay) and NBNS spoofing. If this sounds vaguely familiar, it's because a...
| | bogs.io
3.2 parsecs away

Travel
| | An extensive walk-through the popular methods of exploiting SMB using tools such as Metasploit, Reponder, psexec
| | www.josephguadagno.net
33.1 parsecs away

Travel
| This month in a chat with the speakers of ESPC one of the United States based speakers asked about some travel gear recommendations. I shared my travel gear with them and they found it helpful. I thought it would be a good idea to share it with you all. I have been using this gear for a while now and I am very happy with it. I hope you find it helpful too.