whynotsecurity

15 posts

whynotsecurity

whynotsecurity

@whynotsecurity

Присоединился Kasım 2019
5 Подписки652 Подписчики
whynotsecurity ретвитнул
Nic Losby
Nic Losby@Blurbdust·
Time for another tool drop. This one I wrote a couple weeks ago for converting ldapdomaindump data to Bloodhound data. Currently only the bare minimum to get data uploaded into Bloodhound works. B: whynotsecurity.com/blog/ldd2bh/ G: github.com/blurbdust/ldd2…
English
1
62
138
0
whynotsecurity ретвитнул
Nic Losby
Nic Losby@Blurbdust·
Awhile back I wrote a tool to look for Windows registry files in a given haystack of data (.tar, .vhd, .vmdk). If impacket is installed, it will automatically secretsdump the found registry files. B: whynotsecurity.com/blog/needle/ G: github.com/blurbdust/need…
English
1
22
56
0
whynotsecurity ретвитнул
XSS Payloads
XSS Payloads@XssPayloads·
XSS to RCE: Covert Target Websites into Payload Landing Pages, good introduction article by @knavesec bit.ly/3DdZaXB
English
0
39
112
0
whynotsecurity ретвитнул
Ellis Springe
Ellis Springe@knavesec·
XSS to RCE: Hosting your phishing payload on your client's website, a fun technique for boosting your phishing click rate based off a real attack from a known ransomware threat group Blog: whynotsecurity.com/blog/xss-to-rc…
Ellis Springe tweet mediaEllis Springe tweet media
English
1
4
11
0
whynotsecurity
whynotsecurity@whynotsecurity·
The BloodHound Domain Password Audit Tool, the newest feature of Max. Run cracked password analysis to identify vulnerable groups, privileges and patterns using the power and information of BloodHound. Based off previous work by @OrOneEqualsOne whynotsecurity.com/blog/max3/
English
0
17
40
0
whynotsecurity
whynotsecurity@whynotsecurity·
Back with a new blog post, step up your Bloodhound game with Max! Makes it far easier to extract information and interact with the database whynotsecurity.com/blog/max/
English
0
9
14
0
SwiftOnSecurity
SwiftOnSecurity@SwiftOnSecurity·
@whynotsecurity Hello thank you. Can you confirm where the registry keys are and that they do not have limiting ACLs on them?
English
1
0
7
0
whynotsecurity
whynotsecurity@whynotsecurity·
We are announcing our new blog with a post about Teamviewer and storing user passwords encrypted and not hashed allow for easy plaintext retrieval from the Windows registry. whynotsecurity.com/blog/teamviewe…
English
11
103
222
0