7MS #650: Tales of Pentest Pwnage - Part 65

7MS #650: Tales of Pentest Pwnage - Part 65

53:402024-11-15

Jaksokuvaus

Oooooo, giggidy! Today is (once again) my favorite tale of pentest pwnage. I learned about a feature of PowerUpSQL that helped me find a “hidden” SQL account, and that account ended up being the key to the entire pentest!  I wonder how many hidden SQL accounts I’ve missed on past pentests….SIGH! Check out the awesome BloodHound gang thread about this here. Also, can’t get Rubeus monitor mode to capture TGTs to the registry?  Try output to file instead: rubeus monitor /interval:5 /nowrap /runfor:60 /consoleoutfile:c:\users\public\some-innocent-looking-file.log In the tangent department, I talk about a personal music project I’m resurrecting to help my community.

Tutustu

Lisää

  • Evästekäytäntö
  • Käyttöehdot
  • Tietosuojakäytäntöexternal link
  • Medialleexternal link
logo

© Podme AB 2024