by Mike Saunders | Jan 30, 2020 | Blog Posts
A common part of pen tests – both network and web app – is password spraying. In order to do that, you need usernames. But how do you find out what your target’s usernames are? This is the first in a series of posts to discuss user enumeration and...
by Mike Saunders | Jan 16, 2020 | Blog Posts
In many tests, we end up having to do some kind of password cracking, Kerberoasted hashes, hashes dumped from the SAM or ntds.dit, or some other kind of hash. When cracking, especially when we have a bunch of SPNs or we’ve got the ntds.dit, we aren’t...
by Mike Saunders | May 7, 2019 | Blog Posts
tl/dr; There are a lot of ways to get into infosec. I’ll try to outline some of the things that have helped me along the way and provide some resources to help you. We recently had the pleasure of sponsoring BSides Kansas City. Side note: if you haven’t been, you...
by Mike Saunders | Mar 27, 2019 | Blog Posts
Lots of pen test and red team blogs follow the same model: we came, we saw, we conquered, blue team tears flowed. This is not one of those blogs. TL/DR; Pen testing isn’t about finding vulnerabilities. It’s about finding opportunities for your client to...
by Mike Saunders | Nov 30, 2018 | Blog Posts
Did you know you can use DNS queries to exfiltrate data from a database via SQLi? No? Then continue reading! I’ll walk through some techniques you can use to enumerate and exfiltrate data from a DB server via blind SQLi. On a recent web app test, I encountered a...