powershell

/Tag:powershell

Week 24 In Review – 2017

Events Related Security Fest - www.youtube.com This summer, Göteborg became the most secure city in Sweden! We had a day filled with great talks by internationally renowned speakers on some of the most cutting edge and interesting topics in IT-Security. ShowMeCon 2017 Videos - www.irongeek.com Resources List of Printers Which Do or Do Not Display [...]

Week 2 In Review – 2017

Tools Invoke-TheHash - github.com Invoke-TheHash contains PowerShell functions for performing NTLMv2 pass the hash WMI and SMB command execution. WMI and SMB services are accessed through .NET TCPClient connections. Local administrator privilege is not required client-side. FiercePhish - github.com FiercePhish is a full-fledged phishing framework to manage all phishing engagements. It allows you to track [...]

2017-03-12T17:39:09-07:00 January 8th, 2017|Security Tools, Site News, Week in Review|0 Comments

Week 45 In Review – 2016

Resources Ruxcon - ruxcon.org.au Presentation Slides from Ruxcon Australia BlackHat Europe 2016 - www.blackhat.com Techniques Kerberoasting Without Mimikatz - www.harmj0y.net Thanks to an awesome PowerView pull request by @machosec, Kerberoasting is easier than ever using pure PowerShell. I wanted to briefly cover this technique and its background, how we’ve been using it recently, and a few awesome new developments. [...]

Week 39 In Review – 2016

Resources RECON 2016 Recon Recordings - recon.cx Recon Slides - recon.cx Derbycon 2016 Videos - www.irongeek.com These are the videos of the presentations from Derbycon 2016. Louisville Infosec 2016 Videos - www.irongeek.com Videos from the Louisville Infosec 2016 conference. R00tz 2016 - r00tz.org Tools PowerShell-Suite - github.com Bypass-UAC is self-contained and does not have any dependencies, bar a [...]

2017-03-12T17:39:11-07:00 September 25th, 2016|Security Conferences, Security Tools, Week in Review|0 Comments

Week 1 In Review – 2016

Events Related ICIT Brief: Who’s Behind the Wheel? Exposing the Vulnerabilities and Risks of High Tech Vehicles - icitech.org The brief provides a detailed breakdown of the July 2015 Jeep Cherokee hacking demonstration and an analysis of how hackers would behave during a ‘real-world’ attack Rapid Radio Reversing, ToorCon 2015 - greatscottgadgets.com In this video [...]

2017-03-12T17:39:18-07:00 January 3rd, 2016|Security Conferences, Site News, Week in Review|0 Comments

Week 40 In Review – 2015

Events Related Derbycon 2015 Videos - www.irongeek.com Black Hat USA 2015 - www.youtube.com Louisville Infosec 2015 Videos - www.irongeek.com Thoughts on my very first DerbyCon (which won't be my last) - community.rapid7.com One you hang around in infosec for a little while, you learn that each of the major cons have their own reputation, their [...]

Week 37 In Review – 2015

Events Related 44CON - www.slideshare.net BSides Augusta 2015 Videos - www.irongeek.com Videos from the BSides Augusta conference. Resources Satellite Turla: APT Command and Control in the Sky - securelist.com When you are an APT group, you need to deal with many different problems. One of them, and perhaps the biggest, is the constant seizure and takedown of [...]

Week 3 In Review – 2015

Events Related Hou.Sec.Con 5.0 Experience (by an 8 year old) – prudentgames.com A 8 year old kid, Reuben Paul, share his feeling about Hou.Sec.Con 5.0 Experience! It was about qualities that kids and hackers share which makes kids really good hackers. For example kids are creative, kids are curious, kids are credible and kids are cool [...]

Week 21 In Review – 2014

Resources BSides Nashville 2014 Videos – www.irongeek.com These are the videos of BSides Nashville 2014. You can download the videos from here. Powershell's Pastebin – pastebin.com Pastebin is #1 paste tool. Here is a list of Powershell's pastebin. 2014 Trustwave Global Security Report Available Now – blog.spiderlabs.com Trustwave released their annual 2014 Trustwave Global Security Report, an analysis [...]

Week 10 in Review – 2013

Event Related DEP-ASLR bypass without ROP-JIT.pdf - docs.google.com This is a pdf file from the event CanSecWest 2013 Pwn2Own: IE10, Firefox, Chrome, Reader, Java hacks land $500k - theregister.co.uk It's back to the drawing board for coders at Microsoft, Google, Adobe, Mozilla, and Oracle after entrants in the annual Pwn2Own contest waltzed off with over [...]