|
You are here |
blog.evanricafort.com | ||
| | | | |
foxglovesecurity.com
|
|
| | | | | By @breenmachine Privilege Escalation on Windows 7,8,10, Server 2008, Server 2012... and a new network attack How it works Hot Potato (aka: Potato) takes advantage of known issues in Windows to gain local privilege escalation in default configurations, namely NTLM relay (specifically HTTP->SMB relay) and NBNS spoofing. If this sounds vaguely familiar, it's because a... | |
| | | | |
educatedguesswork.org
|
|
| | | | | ||
| | | | |
blog.ikuamike.io
|
|
| | | | | Introduction After passing my OSCP, I am planning on doing CRTP and CRTO sometime this year. I took the OSCP exam before the updates that are focused on Active Directory so I didn't actively focus on this area. So to learn and practice on AD and Windows and also as some prep for the certifications I plan on taking, I will be doing some machines that are AD related and try to get into the details of the included misconfigurations and vulnerabilities. | |
| | | | |
zwischenzugs.com
|
|
| | | What is nmap? nmapis a network exploration tool and security / port scanner. If you've heard of it, and you're like me, you've most likely used it like this: nmap 127.0.0.1 ie, you've pointed it at an IP address and observed the output: Starting Nmap 7.60 ( https://nmap.org ) at 2018-11-24 18:36 GMT Nmap... | ||