@da_667 it is civilized to proxy that shit (it is the vast majority of the traffic, mostly) and use your own certs, should you proxy through yacy and spider every site you visit? should you use squid proxy to speed up browsing? those options are left to the reader - they all work and you can get reports - are most smb going to do lots of threat hunting probably not but they may go hybrid #unknown binary #ntopng #top talkers #comp intel #enumeration #attribution

Recently, I wrote a write-up for the vulnerable machine from #VulNyx called Controler. It’s a medium-level #Windows machine. #Enumeration begins with the Kerberos account, which I use to gain initial system access. Through further Active Directory enumeration, I #exploit replication rights, ultimately extracting the Domain Administrator’s password hash and gaining full administrative control.

Solving this machine took me some time, but I learned a lot. I touched on new tools like #BloodHound, delved a bit deeper into Active Directory, and, in general, kept my #pentesting skills in check.

If you are starting in #cybersecurity, I would definitely recommend checking some VMs from VulNyx.

https://medium.com/@thecybercraft/vulnyx-controler-writeup-b9ada8e12fdd

Sekken-enum: tool for subdomain enumeration

A GitHub repo offering a tool to perform high-speed subdomain enumeration using wordlists, API integration, and recursive bruteforce.

https://github.com/Nomad0x7/sekken-enum

#Recon #Enumeration

GitHub - Nomad0x7/sekken-enum: adws enumeration bof

adws enumeration bof. Contribute to Nomad0x7/sekken-enum development by creating an account on GitHub.

GitHub

STM32 Short #8 - Understanding USB Enumeration (re-enumeration)

In this videi we will cover the topic of USB Enumeration and how to trigger a USB Host to re-enumerate a STM32 USB Device (or Gadget).

#STM32 #Tutorial #STM32CubeIDE #STM32CubeMX #USB #Enumeration #STM32World

https://www.youtube.com/watch?v=osNf6gyF_zY

STM32 Short #8 - Understanding USB Enumeration (re-enumeration)

YouTube

🤔 Ever wonder how to escape from a container? Or how security tools know what permissions they have from inside that same container? It's nice to have a great script for #enumeration ... but what does it check for and why does it matter?

(or, I did a little editing and put my workshop from @appsec_village at #DEFCON33 up) 

Container Escapes 101 - Who am I?

To start our escape, let’s figure out who we are inside our container first. That’ll help us chart a path out.

Some Natalie’s corner of the internet

Subdomain enumeration is an essential OSINT technique. Amass and Subfinder are well-known enumeration tools, but they have limitations. Explore this comprehensive database with over 200 sources.

https://osintteam.com/passive-subdomain-enumeration-uncovering-more-subdomains-than-subfinder-amass/

#OSINT #Subdomains #Domains #DNS #enumeration

Passive Subdomain Enumeration: Uncovering More Subdomains than Subfinder & Amass

Subdomain Center notes over 200 competitors, yet Amass integrates 87 and Subfinder 45; this article explores better subdomain enumeration tools.

OSINT Team - Learn OSINT from experts

Finally finished implementing the functionality of the PS function for #Enumeration that I've been working on since I saw some flaws in the currently existing tools while studying for #CRTE

It's focused on trying to show interesting ACLs without overwhelming you with lots of useless information. There's probably something out there that does that already (Find-InteterestingDomainAcl is supposed to do the trick but it's still too verbose for me). However, I needed an excuse to dive deeper into ACLs 😜

After cleaning the current monolith of PS scripting and allowing @maikel to peer review it, I'll publish it ☺️

In this week's Linux Update newsletter, Chris Binnie looks at the enumeration tools feroxbuster and ffuf for automating search during a cyberattack
https://www.linux-magazine.com/Issues/2025/290/Enumerating-Resources
#security #tools #feroxbuster #ffuf #enumeration #cyberattack #automation #fuzzing
Looking for Cracks » Linux Magazine

A cyberattack unfolds in stages. The enumeration phase is when the attacker looks for holes in the target system. Tools like feroxbuster and ffuf b...

Linux Magazine

Title of the day: "generatingfunctionology"

https://www2.math.upenn.edu/~wilf/gfologyLinked2.pdf

#enumeration

who spies on you more - ms, apple, google or amazon - ai surveillance content from rob braxman
https://www.youtube.com/watch?v=QwxaRPuJkyU
#tracking #capital surveillance #enumeration #ever cookie
Which Device AI Spies on You the Most: Microsoft, Apple or Google? NOT Who You Think

YouTube