Responder is a go-to tool for most pentesters. We use it quite often on pentests to quickly gain access to a client’s domain.
This post will show how to crack NTLMv1 handshakes with the crack.
During a recent Red-Team engagement, we discovered a series of information disclosures on a site allowing our team to go from zero access to full compromise in a matter of hours.
Recently on a pentest, we encountered a web application that allowed us to control command line args sent to the ‘java’ binary on the underlying server.
USB dropping is one of those famous ‘hacker’ moves from the 2000’s that lives on in infamy.
We will be discussing a technique that isn’t utilized too often anymore and has been around for many years, however appears to be forgotten.
Biscom Secure File Transfer is an application that gives the ability for companies to share files among users and focuses on being easy to use for the everyday user.
Splunk has released an excellent blog post covering the best practices for deploying Splunk securely
There are many popular and powerful payloads available to us as penetration testers, and oftentimes we use them without fully understanding how they work.