You are here |
diverto.github.io | ||
| | | |
marcusedmondson.com
|
|
| | | | Today I wanted to talk about using the deception technology called New-HoneyHash.ps1. This is a tool that was inspired by Mark Baggett and authored by Matt Graeber, that will inject fake credentials into the lsass.exe process. This can be effective at finding attackers who are dumping the lsass process in your environment in order to... | |
| | | |
passing-the-hash.blogspot.com
|
|
| | | | So one of my favorite techniques on the Windows side is to use what Benjamin Delpy (@gentilkiwi) called 'overpass the hash' to get a legit K... | |
| | | |
blog.ropnop.com
|
|
| | | | I've shown all the different ways to own a Windows environment when you have a password - but having a hash is just as good! Don't bother cracking - PTH! | |
| | | |
www.runzero.com
|
|
| | Some versions of Palo Alto Networks PAN-OS software allows for remote command injection. Here's how to find potentially impacted assets. |