Credential Theft

10 bookmarks
Custom sorting
The Dog Whisperer’s Handbook
The Dog Whisperer’s Handbook
Generally speaking, I'm more of a Cat type of guy, but I have to say I really love BloodHound. And if you do too, you are in for a treat... Last week, the ERNW Insight Active Directory Security Summit took place in Heidelberg. (More Info) For this occasion, @Enno_Insinuator asked me if I would like to deliver a BloodHound Workshop, and of course I accepted the challenge... We had a full ...
·insinuator.net·
The Dog Whisperer’s Handbook
Introducing BloodHound
Introducing BloodHound
Intro & Background In February of this year, I posted a proof-of-concept script called “PowerPath” which combined Will Schroeder’s PowerView, Justin Warner’s concept of derivative local admin…
·wald0.com·
Introducing BloodHound
LAPS
LAPS
·docs.microsoft.com·
LAPS
Dumping Clear-Text Credentials
Dumping Clear-Text Credentials
Passwords in clear-text that are stored in a Windows host can allow penetration testers to perform lateral movement inside an internal network and eventually fully compromise it. Therefore in a sys…
·pentestlab.blog·
Dumping Clear-Text Credentials
LSASS Memory Dumps Are Stealthier Than Ever Before
LSASS Memory Dumps Are Stealthier Than Ever Before
LSASS memory dump files aid attackers to swiftly extract credentials. Read an in-depth analysis of LSASS dumps as an attack vector & dumping methods.
·deepinstinct.com·
LSASS Memory Dumps Are Stealthier Than Ever Before