MOST POPULAR VIDEOS
LATEST BLOG POSTS
In many tests, we end up having to do some kind of password cracking, Kerberoasted hashes, hashes dumped from the SAM or ntds.dit, or some other kind of hash. When cracking, especially when we have a bunch of SPNs or we've got the ntds.dit, we aren't focused on...
To view this protected post, enter the password below:
During red team engagements, we try to gather information about our targets as quietly as possible. One piece of information that can be difficult to find is employee cell phone numbers. While researching a different subject, I stumbled across a way to correlate cell...
MOST POPULAR SLIDES
GET THE LATEST
Sign up for the latest resources from Red Siege.