Explore >> Select a destination


You are here

blog.evanricafort.com
| | foxglovesecurity.com
11.1 parsecs away

Travel
| | By @breenmachine Privilege Escalation on Windows 7,8,10, Server 2008, Server 2012... and a new network attack How it works Hot Potato (aka: Potato) takes advantage of known issues in Windows to gain local privilege escalation in default configurations, namely NTLM relay (specifically HTTP->SMB relay) and NBNS spoofing. If this sounds vaguely familiar, it's because a...
| | educatedguesswork.org
11.4 parsecs away

Travel
| |
| | blog.ikuamike.io
6.7 parsecs away

Travel
| | Introduction After passing my OSCP, I am planning on doing CRTP and CRTO sometime this year. I took the OSCP exam before the updates that are focused on Active Directory so I didn't actively focus on this area. So to learn and practice on AD and Windows and also as some prep for the certifications I plan on taking, I will be doing some machines that are AD related and try to get into the details of the included misconfigurations and vulnerabilities.
| | zwischenzugs.com
36.0 parsecs away

Travel
| What is nmap? nmapis a network exploration tool and security / port scanner. If you've heard of it, and you're like me, you've most likely used it like this: nmap 127.0.0.1 ie, you've pointed it at an IP address and observed the output: Starting Nmap 7.60 ( https://nmap.org ) at 2018-11-24 18:36 GMT Nmap...