
Sign up to save your podcasts
Or


Oooooo, giggidy! Today is (once again) my favorite tale of pentest pwnage. I learned about a feature of PowerUpSQL that helped me find a “hidden” SQL account, and that account ended up being the key to the entire pentest! I wonder how many hidden SQL accounts I’ve missed on past pentests….SIGH! Check out the awesome BloodHound gang thread about this here.
Also, can’t get Rubeus monitor mode to capture TGTs to the registry? Try output to file instead:
rubeus monitor /interval:5 /nowrap /runfor:60 /consoleoutfile:c:\users\public\some-innocent-looking-file.log
In the tangent department, I talk about a personal music project I’m resurrecting to help my community.
By Brian Johnson4.7
6868 ratings
Oooooo, giggidy! Today is (once again) my favorite tale of pentest pwnage. I learned about a feature of PowerUpSQL that helped me find a “hidden” SQL account, and that account ended up being the key to the entire pentest! I wonder how many hidden SQL accounts I’ve missed on past pentests….SIGH! Check out the awesome BloodHound gang thread about this here.
Also, can’t get Rubeus monitor mode to capture TGTs to the registry? Try output to file instead:
rubeus monitor /interval:5 /nowrap /runfor:60 /consoleoutfile:c:\users\public\some-innocent-looking-file.log
In the tangent department, I talk about a personal music project I’m resurrecting to help my community.

184 Listeners

2,002 Listeners

369 Listeners

373 Listeners

637 Listeners

1,016 Listeners

322 Listeners

414 Listeners

8,001 Listeners

175 Listeners

314 Listeners

188 Listeners

73 Listeners

134 Listeners

44 Listeners