Linking pages
- Five Pentesting Tools and Techniques (That Every Sysadmin Should Know) | by Jeremy Trinka | Medium https://medium.com/@jeremy.trinka/five-pentesting-tools-and-techniques-that-sysadmins-should-know-about-4ceca1488bff 39 comments
- Stealing login credentials from a locked PC or Mac just got easier | Ars Technica http://arstechnica.com/security/2016/09/stealing-login-credentials-from-a-locked-pc-or-mac-just-got-easier/ 21 comments
- State of Pentesting 2020 – Sec Team Blog https://blog.scrt.ch/2020/12/28/state-of-pentesting-2020/ 20 comments
- GitHub - skorov/ridrelay: Enumerate usernames on a domain where you have no creds by using SMB Relay with low priv. https://github.com/skorov/ridrelay 11 comments
- Deanonymizing Windows users and capturing Microsoft and VPN accounts | by ValdikSS | Medium https://medium.com/@ValdikSS/deanonymizing-windows-users-and-capturing-microsoft-and-vpn-accounts-f7e53fe73834#.i7g8vlm2k 6 comments
- GitHub - codeexpress/respounder: Respounder detects presence of responder in the network. https://github.com/codeexpress/respounder 6 comments
- What is LLMNR & WPAD and How to Abuse Them During Pentest ? – Pentest Blog https://pentest.blog/what-is-llmnr-wpad-and-how-to-abuse-them-during-pentest/ 5 comments
- Uncommon Phishing and Social Engineering Techniques - VoidSec https://voidsec.com/uncommon-social-engineering-phishing-techniques/ 4 comments
- Firework: Leveraging Microsoft Workspaces in a Penetration Test | SpiderLabs blog | Trustwave https://www.trustwave.com/Resources/SpiderLabs-Blog/Firework--Leveraging-Microsoft-Workspaces-in-a-Penetration-Test/ 4 comments
- My Weirdest Bug Bounty — Getting PII from O365. | by Omaid Faizyar | Medium https://medium.com/@omaidfaizyar/my-weirdest-bug-bounty-getting-pii-from-o365-b4477f4739e 4 comments
- Gladius: Automatic Responder Cracking - Praetorian https://www.praetorian.com/blog/gladius-automatic-responder-cracking 3 comments
- Getting Root Access Through a Typo: LLMNR Poisoning – // Chox Security Blog https://chox.ca/2022/03/28/hacking-my-own-active-directory-setup-using-llmnr-poisoning/ 1 comment
- Red Teaming Toolkit Collection - 0xsp SRD https://0xsp.com/offensive/red-teaming-toolkit-collection 1 comment
- Abusing Microsoft Word Features for Phishing: “subDoc” - Rhino Security Labs https://rhinosecuritylabs.com/research/abusing-microsoft-word-features-phishing-subdoc/ 0 comments
- GitHub - enaqx/awesome-pentest: A collection of awesome penetration testing resources, tools and other shiny things https://github.com/enaqx/awesome-pentest 0 comments
- Stealing login credentials from a locked PC or Mac just got easier | Ars Technica http://arstechnica.co.uk/security/2016/09/stealing-login-credentials-from-a-locked-pc-or-mac-just-got-easier/ 0 comments
- GitHub - Aptive/penetration-testing-tools: Penetration Testing tools - one repo to clone them all... containing latest pen testing tools https://github.com/Aptive/penetration-testing-tools 0 comments
- Automatically Stealing Password Hashes with Microsoft Outlook and OLE https://insights.sei.cmu.edu/cert/2018/04/automatically-stealing-password-hashes-with-microsoft-outlook-and-ole.html 0 comments
- Broadcast Name Resolution Poisoning / WPAD Attack Vector - Praetorian https://www.praetorian.com/blog/broadcast-name-resolution-poisoning-wpad-attack-vector 0 comments
- GitHub - byt3bl33d3r/MITMf: Framework for Man-In-The-Middle attacks https://github.com/byt3bl33d3r/MITMf 0 comments