Explore >> Select a destination


You are here

diverto.github.io
| | marcusedmondson.com
12.8 parsecs away

Travel
| | Today I wanted to talk about using the deception technology called New-HoneyHash.ps1. This is a tool that was inspired by Mark Baggett and authored by Matt Graeber, that will inject fake credentials into the lsass.exe process. This can be effective at finding attackers who are dumping the lsass process in your environment in order to...
| | passing-the-hash.blogspot.com
17.1 parsecs away

Travel
| | So one of my favorite techniques on the Windows side is to use what Benjamin Delpy (@gentilkiwi) called 'overpass the hash' to get a legit K...
| | blog.ropnop.com
16.7 parsecs away

Travel
| | I've shown all the different ways to own a Windows environment when you have a password - but having a hash is just as good! Don't bother cracking - PTH!
| | www.runzero.com
77.1 parsecs away

Travel
| Some versions of Palo Alto Networks PAN-OS software allows for remote command injection. Here's how to find potentially impacted assets.