Be careful, next time that you leave your computer unattended at your office!
Category: Penetration Testing
Cracking Wi-Fi passwords, spoofing accounts, and testing networks on the road! Great tutorial by LifeHacker!
Really useful for penetration testing purposes! If a program has been written in order to keep in memory some credentials in clear text, this can be a security risk. When you make a security assessment, it will be useful a tool that scans processes memory searching for cleartext passwords, like Mimikatz, a tool written by […]
Highon.Coffee has published a useful high level overview of the typical commands you would run when performing a penetration test. Here the table of contents: Recon and Enumeration NMAP Commands SMB enumeration Other Host Discovery SMB Enumeration Python Local Web Server Mounting File Shares Basic Finger Printing SNMP Enumeration DNS Zone Transfers DNSRecon HTTP / HTTPS Webserver Enumeration […]