Explore >> Select a destination


You are here

blog.ropnop.com
| | eapolsniper.github.io
2.4 parsecs away

Travel
| | [AI summary] The article discusses techniques for attackers to capture plain text SSH passwords from Linux systems using strace to monitor process activity and extract credentials for lateral movement in a network.
| | bogs.io
1.7 parsecs away

Travel
| | An extensive walk-through the popular methods of exploiting SMB using tools such as Metasploit, Reponder, psexec
| | passing-the-hash.blogspot.com
1.6 parsecs away

Travel
| | So one of my favorite techniques on the Windows side is to use what Benjamin Delpy (@gentilkiwi) called 'overpass the hash' to get a legit K...
| | www.sjoerdlangkemper.nl
18.0 parsecs away

Travel
| To securely store passwords they should be hashed with a slow hashing function, such as PBKDF2. PBKDF2 is slow because it calls a fast hash function many times. This blog post explores some properties that the iterations must have to be secure.