Persist with your local accounts. Don't succumb to MS's need for you to be online.
Useful as MS has removed the BypassNRO script from preview builds
| https://twitter.com/Stealthsploit | |
| In.security | https://In.security |
| Discord | https://discord.gg/aCgUbE8ePD |
Persist with your local accounts. Don't succumb to MS's need for you to be online.
Useful as MS has removed the BypassNRO script from preview builds
Top #hashcat tip:
Want per-position duplication in your rules to leverage your GPU?
It's not available in a single op, but you can emulate it by incrementally duplicating the first N chars, and then incrementally deleting the position and frequency of the redundant characters
In.security is excited to be back at @blackhatevents USA this year, where tickets are selling fast for both our Hacking Enterprises and Defending Enterprises trainings, both updated for 2024 and running 3-4 and 5-6 August.
Why not join us for both? Spend the weekend getting hands-on with phishing, IPv6, C2, pivoting, tunnelling, evading AMSI/AV, credential harvesting, subverting AWL, p@ssphras3 cracking, AD CS, domain trusts, and OOB action (to name a few)...
...and then spend 2 days learning how to detect and alert on everything you just did?! You'll get deep into monitoring, alerting, detecting and threat hunting IoAs and IoCs in Sentinel from a huge amount of TTPs in our modern hybrid on-prem and cloud labs.
Everyone gets 2 weeks free lab time after class π
..aaaand we're live! Back by popular demand, the updated 2024 editions of Hacking Enterprises and Defending Enterprises are now taking registrations for @blackhatevents USA 2024 #BHUSA this summer!
Get those early bird prices while you can https://in.security/events/
How old were you when you discovered you could resume a cancelled/broken scp with:
rsync --partial --progress --rsh=ssh <source> <dest>
I was today years old.
β Which protocol provides IPv6 host discovery?
β What does the command dig -x 1.3.3.7 do?
β Where is Active Directoryβs database located?
β Which type of hash is obtained in a Kerberoasting attack?
These are just some of the many questions from our ongoing Infosec/Pentest quizzes. Want to take part and learn some new things along the way? In.security's Discord link is below, come and say hi! π