
Sign up to save your podcasts
Or


Hey friends, today we share the (hopefully) thrilling conclusion of last week's pentest. Here are some key points:
From those dumps you can definitely try to crack the DCC hashes using a local or cloud cracker - see our series on this topic for some guidance.
Got an NTLM hash for a privileged user and want to PS remote into a victim system? You can essentially do a PowerShell login pass-the-hash with evil-winrm!
The Brute Ratel crisis monitor is awesome for watching a box and monitoring for people logging in and out of it (perfect for getting ready to strike with lsass dumps!)
By Brian Johnson4.7
6868 ratings
Hey friends, today we share the (hopefully) thrilling conclusion of last week's pentest. Here are some key points:
From those dumps you can definitely try to crack the DCC hashes using a local or cloud cracker - see our series on this topic for some guidance.
Got an NTLM hash for a privileged user and want to PS remote into a victim system? You can essentially do a PowerShell login pass-the-hash with evil-winrm!
The Brute Ratel crisis monitor is awesome for watching a box and monitoring for people logging in and out of it (perfect for getting ready to strike with lsass dumps!)

187 Listeners

2,006 Listeners

372 Listeners

372 Listeners

651 Listeners

1,020 Listeners

319 Listeners

416 Listeners

8,057 Listeners

179 Listeners

315 Listeners

188 Listeners

74 Listeners

139 Listeners

44 Listeners