Brian Johnson
Brian Johnson
Hey Beau, Finally got a chance to use MailSniper on an engagement this week, and tried out the `Invoke-DomainHarvest` module with a list of about 8 domain names I *thought*...
Hello, I've run docker-crashplan-pro on my Synology for months without issue, then recently started getting warnings that backups were failing. Usually I just remove the container, update to the latest,...
Hello, I'm on a pentest where Metasploit's [mssql_ntlm_stealer](https://www.rapid7.com/db/modules/auxiliary/admin/mssql/mssql_ntlm_stealer/) works on two SQL servers and allows for the capture of the same higher-priv'd account in Active Directory. SMB signing is enabled...
Hey evilsocket, Finally got to use xray today and it's GREAT! Thanks much for your efforts in making this tool. It would be nice to be able to have some...
Hello there, I'm SUPER excited to try this in the lab. I spun up a fresh Server 2019, joined to my test domain, and then followed [this blog](https://www.onkelx.nl/2017/07/28/install-and-configure-active-directory-certificate-authority-using-powershell/) to install...
The readme.md mentions https://7ms.us/bpatty/ but that page is busted. Please adjust. kthxbye
### Configuration impacket version: Latest Python version: 3.10 Target OS: Kali latest ### Debug Output With Command String I was doing a secretsdump with DA creds as follows: `./secretsdump.py -just-dc-ntlm...
Hello! On a test I've found a config reporting vulnerable to ESC8. I setup `certipy relay -target vulnca.domain.com` when I try to coerce from a DC with `coerce -u user...
Hi! I used Certipy to identify a ESC3 vuln on a pentest. I did the `req` song and dance: `certipy req -u [email protected] -p Winter2023 -ca CA-NAME -target F.Q.D.N -template...
Hi there, I have two fresh Kali boxes (2019.4) that I've really only done the round of apt-get update/upgrades on, as well as download Responder, Mitm6, ntlmrelay, etc. I've also...