|
You are here |
blog.ropnop.com | ||
| | | | |
eapolsniper.github.io
|
|
| | | | | [AI summary] The article discusses techniques for attackers to capture plain text SSH passwords from Linux systems using strace to monitor process activity and extract credentials for lateral movement in a network. | |
| | | | |
bogs.io
|
|
| | | | | An extensive walk-through the popular methods of exploiting SMB using tools such as Metasploit, Reponder, psexec | |
| | | | |
passing-the-hash.blogspot.com
|
|
| | | | | So one of my favorite techniques on the Windows side is to use what Benjamin Delpy (@gentilkiwi) called 'overpass the hash' to get a legit K... | |
| | | | |
www.sjoerdlangkemper.nl
|
|
| | | To securely store passwords they should be hashed with a slow hashing function, such as PBKDF2. PBKDF2 is slow because it calls a fast hash function many times. This blog post explores some properties that the iterations must have to be secure. | ||