And then, one day after the story of Lenovo and Superfish went viral, Microsoft published an update to Windows Defender that both removes Superfish itself and resets all SSL certificates that were affected, and I was imagining the engineer in charge of that update being all like...
February meeting: 02/16/15 (Meeting date was moved) The NoVA Hackers meeting will be held at the usual place, with the usual requirements for putting your name on the list . You should join the NoVA Hackers Google Group (by getting or asking for an invitat...
- Red Team, 2011 - present
- DIY UniversityInformation Security, 2005 - present
Milkman: Creating processes as any currently logged in user - Room362.com
One of the problems with using PSEXEC from Metasploit (any of the psexec modules) is that it runs as SYSTEM. What’s the problem with that? I
Dumping NTDS.dit domain hashes using Samba - Room362.com
So there was this blog post that talking about a number of ways to dump windows credentials by @lanjelot [definitly someone to follow] – her
Executing code via SMB / DCOM without PSEXEC - Room362.com
PSEXEC has been a staple for Windows post exploitation pivoting and system administration for a long while. The basic premise of how all “ …
Application Whitelist Bypass using IEexec.exe - Room362.com
Guest post by @infosecsmith2 There was a recent presentation at DerbyCon, entitled: Living Off the Land: A Minimalist’s Guide to Windows Pos
New EMP Missile Knocks out Computers and Electronics with Precision
Ask any Sci-Fi geek what the greatest threat to computers is and they will not respond with “Cyberwar”, or anything with the word “Cyber” in