You are here |
marcusedmondson.com | ||
| | | |
pentestlab.blog
|
|
| | | | Windows operating systems use the RID (Relative Identifier) to differentiate groups and user accounts. It is part of the Security Identifier (SID) and every time a new account or a group is created the number is increased by one. The local administrator group RID is always 500 and standard users or groups typically start with | |
| | | |
www.ericconrad.com
|
|
| | | | Video of the talk Links from my Security Onion Con 2016 talk: C2 Phone Home: Leveraging SecurityOnion to Identify Command and Control ... | |
| | | |
diverto.github.io
|
|
| | | | When in password hunting mode and having access to the filesystem of the target, most people would reach out to SAM and/or extracting cached credentials. While this can usually be the way to go, it can pose a huge challenge, as the result can depend on the strength of the storage format of the password and the strength of the password itself. Something often overlooked is hiberfil.sys and/or virtual machine snapshots or memory dumps, as they usually contain passwords in plain text. When you have those, there's no need for cracking at all and it doesn't depend on password strength/size. | |
| | | |
highon.coffee
|
|
| | LFI Explained and the techniques to leverage a shell from a local file inclusion vulnerability. How to get a shell from LFI |