by frank | Jun 28, 2019 | Blue Team, Red team, Security, Windows
Reading Time: < 1 minuteecho %logonserver% findstr /S /I cpassword \\xxDC01\sysvol\xxxdc01\policies*.xml crack cpassword with the default AES key...
by frank | Jun 28, 2019 | Misc, Red team, Security, Windows
pyinstaller -i toto.ico -w -F toto.py Medium article : https://medium.com/dreamcatcher-its-blog/making-an-stand-alone-executable-from-a-python-script-using-pyinstaller-d1df9170e263 Another one which I don’t agree, as yes, payload is undetected by execute will...
by frank | Jun 28, 2019 | Red team, Security, Windows
Analyse Windows Systeminfo output, and produce a lit of the vulnerabilities and possible only show which ones have exploitspython wesng.py –exploits-only...
by frank | Jun 28, 2019 | Misc, Security, Windows
Reading Time: < 1 minuteIn the olden days, we did for example telnet mailserver 110, and then we could get the combination of username/password or other checks.With all being TLS/SSL, here is a way to do the way but with a TLS underlay.openssl s_client -connect...
by frank | Jun 28, 2019 | Blue Team, Security, Windows
Reading Time: < 1 minuteTime to disable SMBv1 ! https://support.microsoft.com/en-gb/help/2696547/detect-enable-disable-smbv1-smbv2-smbv3-in-windows-and-windows-server Win 8 : Disable-WindowsOptionalFeature -Online -FeatureName SMB1Protocol Win10 :...
Recent Comments