"tool ’ s features. bonus : for more burp related content, check out “ basics of burp ( ing ) for testing web app security ” by chris traynor – https : / / www. youtube. com / watch? v = gb7oqm5 - xdw pentester tactics, techniques, and procedures ttps – chris traynor chris ’ s vid…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1558.003Kerberoasting
77%
"works ( i always forget ). understanding the different methods of attacking kerberos will be essential on internal pentests. kerberoasting, pass - the - ticket, over - pass - the - hash, extract and crack, and other methods are discussed. things not to do in pentest reports : tip…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1557.001Name Resolution Poisoning and SMB Relay
51%
"to steal credentials and access. gabriel discusses network protocol vulnerabilities and tools available to exploit these vulnerabilities. this video covers responder, ipv6 poisoning, dhcp poisoning, da privilege escalation, and so much more. how to attack when llmnr, mdns, and wp…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1558Steal or Forge Kerberos Tickets
43%
"works ( i always forget ). understanding the different methods of attacking kerberos will be essential on internal pentests. kerberoasting, pass - the - ticket, over - pass - the - hash, extract and crack, and other methods are discussed. things not to do in pentest reports : tip…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1558.004AS-REP Roasting
34%
"to steal credentials and access. gabriel discusses network protocol vulnerabilities and tools available to exploit these vulnerabilities. this video covers responder, ipv6 poisoning, dhcp poisoning, da privilege escalation, and so much more. how to attack when llmnr, mdns, and wp…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
Summary
shenetworks // The Black Hills Information Security YouTube channel has over 400 videos available. Over the past year, I have attended many webcasts and explored plenty of the videos. I […]