Identifying & Bypassing Responder Detections
It is nearly 2024, and broadcast protocols and lack of SMB signing are still default settings on Microsoft Windows hosts. This means the classic technique of broadcast traffic poisoning to […]
It is nearly 2024, and broadcast protocols and lack of SMB signing are still default settings on Microsoft Windows hosts. This means the classic technique of broadcast traffic poisoning to […]
Wafer locks are simple at heart, they try as best they can to protect the assets of their owners. With a little careful skill, they can be cajoled into handing […]
Bypassing Microsoft Defender For Identity Detections On a few recent internal penetration tests, I found common tools and techniques for Active Directory attacks being detected by Microsoft Defender for Identity […]
Lockpicking is a practical skill that serves various purposes: from helping someone who’s locked themselves out of their house, to a challenging and engaging sport pursued by enthusiasts all around […]
Health Industry Threats Health industry threats are still on the rise. Healthcare organizations remain a target for threat actors pursuing monetary gain or fulfilling some nation-state’s agenda. As patient care […]
Welcome to Part 2 of the Windows Credential Dumping Protection series! If you are completely unfamiliar with Credential Dumping or LSA Protection, please check out Part 1! What Is LSA […]
What Is Credential Dumping? In a Windows environment, users authenticate to their machines (either locally or remotely) with their username and password. Behind the scenes, Windows hands off all authentication […]
Password Cracking has its own large methodology when it comes to targeted methods of cracking passwords. You can consider English and other language models, passphrases, 1337sp34k translations, case MoDiFCaTiOn, distributed […]
Lock Picking Guide To Propane Cage Locks Howdy folks! This blog post will be a quick explanation of how lock picking can improve your everyday life. I will give a […]
Welcome to part 4, my Phishing friends. Thanks for returning to our Phishing For Success series! As you probably know by now, I’m a Senior Threat Emulation Specialist here at […]