Explore >> Select a destination


You are here

byt3bl33d3r.github.io
| | bogs.io
2.9 parsecs away

Travel
| | An extensive walk-through the popular methods of exploiting SMB using tools such as Metasploit, Reponder, psexec
| | cornerpirate.com
2.6 parsecs away

Travel
| | It finally happened: you have used responder to capture hashes but failed to crack them. This post covers one more way you can use Responder to gain access anyway. Just Give Me the Steps If you are time poor here is just the steps: Find a list of hosts on the network that do not...
| | foxglovesecurity.com
4.5 parsecs away

Travel
| | By @breenmachine Privilege Escalation on Windows 7,8,10, Server 2008, Server 2012... and a new network attack How it works Hot Potato (aka: Potato) takes advantage of known issues in Windows to gain local privilege escalation in default configurations, namely NTLM relay (specifically HTTP->SMB relay) and NBNS spoofing. If this sounds vaguely familiar, it's because a...
| | martinralbrecht.wordpress.com
23.0 parsecs away

Travel
| Together with Lenka Mareková, Kenny Paterson, Eyal Ronen and Igors Stepanovs, we have finally completed our (first, formal, in-depth, computational) analysis of the Telegram key exchange. This work is going to be presented at Eurocrypt 2025 in Madrid. Abstract. We describe, formally model, and prove the security of Telegram's key exchange protocols for client-server communications....