|
You are here |
www.sweharris.org | ||
| | | | |
blog.oddbit.com
|
|
| | | | | There are many guides out there to help you configure your Linux system as an LDAP and Kerberos client to an Active Directory server. Most of these guides solve the problem of authentication by embedding a username and password into a configuration file somewhere on your system. While this works, it presents some problems: If you use a common account for authentication from all of your Linux systems, a compromise on one system means updating the configuration of all of your systems. If you don't want to ... | |
| | | | |
adsecurity.org
|
|
| | | | | ||
| | | | |
passing-the-hash.blogspot.com
|
|
| | | | | So one of my favorite techniques on the Windows side is to use what Benjamin Delpy (@gentilkiwi) called 'overpass the hash' to get a legit K... | |
| | | | |
thehackernews.com
|
|
| | | The Hacker News | Cybersecurity Webinars - The Hacker News | ||