7MS #591: Tales of Pentest Pwnage - Part 52

7MS #591: Tales of Pentest Pwnage - Part 52

Today we talk about an awesome path to internal network pentest pwnage using downgraded authentication from a domain controller, a tool called ntlmv1-multi, and a boatload of cloud-cracking power on the cheap from vast.ai. Here's my chicken scratch notes for how to take the downgraded authentication hash capture (using Responder.py -I eth0 --lm) and eventually tweeze out the NTLM hash of the domain controller (see https://7ms.us for full show notes).

Populært innen Politikk og nyheter

giver-og-gjengen-vg
aftenpodden
hva-star-du-for
aftenpodden-usa
forklart
stopp-verden
nokon-ma-ga
popradet
fotballpodden-2
dine-penger-pengeradet
det-store-bildet
aftenbla-bla
frokostshowet-pa-p5
rss-dannet-uten-piano
unitedno
e24-podden
rss-ness
liverpoolno-pausepraten
oppdatert
rss-borsmorgen-okonominyhetene