Explore >> Select a destination


You are here

marcusedmondson.com
| | pentestlab.blog
15.0 parsecs away

Travel
| | Windows operating systems use the RID (Relative Identifier) to differentiate groups and user accounts. It is part of the Security Identifier (SID) and every time a new account or a group is created the number is increased by one. The local administrator group RID is always 500 and standard users or groups typically start with
| | www.ericconrad.com
18.6 parsecs away

Travel
| | Video of the talk Links from my Security Onion Con 2016 talk: C2 Phone Home: Leveraging SecurityOnion to Identify Command and Control ...
| | diverto.github.io
12.8 parsecs away

Travel
| | When in password hunting mode and having access to the filesystem of the target, most people would reach out to SAM and/or extracting cached credentials. While this can usually be the way to go, it can pose a huge challenge, as the result can depend on the strength of the storage format of the password and the strength of the password itself. Something often overlooked is hiberfil.sys and/or virtual machine snapshots or memory dumps, as they usually contain passwords in plain text. When you have those, there's no need for cracking at all and it doesn't depend on password strength/size.
| | highon.coffee
83.4 parsecs away

Travel
| LFI Explained and the techniques to leverage a shell from a local file inclusion vulnerability. How to get a shell from LFI