|
You are here |
shenaniganslabs.io | ||
| | | | |
njmulsqb.github.io
|
|
| | | | | Explore real-world insights from a successful penetration test on an enterprise Active Directory environment. Learn how the domain controllers were compromised within just a few hours using multiple attack vectors. From initial recon to privilege escalation and lateral movement, this case study offers a comprehensive guide to Active Directory security weaknesses and how to fortify them. | |
| | | | |
foxglovesecurity.com
|
|
| | | | | By @breenmachine Privilege Escalation on Windows 7,8,10, Server 2008, Server 2012... and a new network attack How it works Hot Potato (aka: Potato) takes advantage of known issues in Windows to gain local privilege escalation in default configurations, namely NTLM relay (specifically HTTP->SMB relay) and NBNS spoofing. If this sounds vaguely familiar, it's because a... | |
| | | | |
bogs.io
|
|
| | | | | An extensive walk-through the popular methods of exploiting SMB using tools such as Metasploit, Reponder, psexec | |
| | | | |
www.josephguadagno.net
|
|
| | | This month in a chat with the speakers of ESPC one of the United States based speakers asked about some travel gear recommendations. I shared my travel gear with them and they found it helpful. I thought it would be a good idea to share it with you all. I have been using this gear for a while now and I am very happy with it. I hope you find it helpful too. | ||