Webinars da OneTrust ensinam tudo o que você sempre queria saber sobre LGPD (de graça)
https://thehack.com.br/webinars-da-onetrust-ensinam-tudo-o-que-voce-sempre-queria-saber-sobre-lgpd-de-graca/
📨 @Phantasm_Lab
https://thehack.com.br/webinars-da-onetrust-ensinam-tudo-o-que-voce-sempre-queria-saber-sobre-lgpd-de-graca/
📨 @Phantasm_Lab
The Hack
Webinars da OneTrust ensinam tudo o que você sempre queria saber sobre LGPD (de graça)
A LGPD Masterclass 2020 é composta por vídeos de 60 minutos abordando todos os aspectos da lei brasileira de proteção de dados.
“Lives falsas” são o golpe na moda e já fazem vítimas no Brasil; entenda
https://thehack.com.br/lives-falsas-sao-o-golpe-na-moda-e-ja-fazem-vitimas-no-brasil-entenda/
📨 @Phantasm_Lab
https://thehack.com.br/lives-falsas-sao-o-golpe-na-moda-e-ja-fazem-vitimas-no-brasil-entenda/
📨 @Phantasm_Lab
The Hack
“Lives falsas” são o golpe na moda e já fazem vítimas no Brasil; entenda
Surfando na onda das transmissões ao vivo, golpistas enganam usuários leigos e roubam dinheiro de internautas desavisados.
Forwarded from SHELL SHOCK
https://www.udemy.com/course/web-server-hacking-for-ethical-hacking/?couponCode=WHACK19
https://www.udemy.com/course/digital-forensics-for-ethical-hacking-course/?couponCode=DIGITAL-FORENSICS
https://www.udemy.com/course/cyber-security-web-application-exploitation/?couponCode=CYBER-HACK
https://www.udemy.com/course/ethical-hacking-artifacts-course/?couponCode=BE-HACKER
https://www.udemy.com/course/digital-forensics-for-ethical-hacking-course/?couponCode=DIGITAL-FORENSICS
https://www.udemy.com/course/cyber-security-web-application-exploitation/?couponCode=CYBER-HACK
https://www.udemy.com/course/ethical-hacking-artifacts-course/?couponCode=BE-HACKER
Udemy
Web Server Hacking For Ethical Hacking
Comprehensive course! A beginner's web hacking course.
HTB - Cascade
00:00 - Intro
00:50 - Begin of nmap
02:45 - Enumerating RPC to identify usernames
04:45 - Setting up a bruteforce and creating a custom wordlist with hashcat
08:45 - Enumerating LDAP with LDAPSEARCH
10:55 - Discovering the cascadeLegacyPwd LDAP Attribute which has a password
12:45 - Using CrackMapExec to test the credential found in LDAP
14:30 - Installing the latest CrackMapExec to gain access to the Spider_Plus Module
17:30 - Using the spider_plus module of CME (CrackMapExec) to crawl the SMB Share as R.Thompson
20:10 - Mounting the SMB Share as R.Thompson in order to view the files in Data share
26:10 - Discovering the VNC Install.reg file which contains an encrypted password
30:10 - Using Metasploit IRB to decrypt TightVNC's password
32:30 - Using the VNC Password to gain a WinRM Session to Cascade as s.smith discovering he is in the Audit Group
37:20 - Using DNSPY to decompile the CascAudit DotNet application
39:50 - Setting a breakpoint in DNSPY where the password is decrypted and viewing the variable after it decrypts the pw
42:10 - Gaining e remote shell as ArkSvc to discover this user is in the AD Recycle Bin Group
43:10 - Viewing deleted Active Directory items to see the TempAdmin has the CascadeLegacyPwd field and discovering this is the PW for administrator
https://www.youtube.com/watch?v=mr-fsVLoQGw
🧬 @Phantasm_Lab
00:00 - Intro
00:50 - Begin of nmap
02:45 - Enumerating RPC to identify usernames
04:45 - Setting up a bruteforce and creating a custom wordlist with hashcat
08:45 - Enumerating LDAP with LDAPSEARCH
10:55 - Discovering the cascadeLegacyPwd LDAP Attribute which has a password
12:45 - Using CrackMapExec to test the credential found in LDAP
14:30 - Installing the latest CrackMapExec to gain access to the Spider_Plus Module
17:30 - Using the spider_plus module of CME (CrackMapExec) to crawl the SMB Share as R.Thompson
20:10 - Mounting the SMB Share as R.Thompson in order to view the files in Data share
26:10 - Discovering the VNC Install.reg file which contains an encrypted password
30:10 - Using Metasploit IRB to decrypt TightVNC's password
32:30 - Using the VNC Password to gain a WinRM Session to Cascade as s.smith discovering he is in the Audit Group
37:20 - Using DNSPY to decompile the CascAudit DotNet application
39:50 - Setting a breakpoint in DNSPY where the password is decrypted and viewing the variable after it decrypts the pw
42:10 - Gaining e remote shell as ArkSvc to discover this user is in the AD Recycle Bin Group
43:10 - Viewing deleted Active Directory items to see the TempAdmin has the CascadeLegacyPwd field and discovering this is the PW for administrator
https://www.youtube.com/watch?v=mr-fsVLoQGw
🧬 @Phantasm_Lab
YouTube
HackTheBox - Cascade
00:00 - Intro
00:50 - Begin of nmap
02:45 - Enumerating RPC to identify usernames
04:45 - Setting up a bruteforce and creating a custom wordlist with hashcat
08:45 - Enumerating LDAP with LDAPSEARCH
10:55 - Discovering the cascadeLegacyPwd LDAP Attribute…
00:50 - Begin of nmap
02:45 - Enumerating RPC to identify usernames
04:45 - Setting up a bruteforce and creating a custom wordlist with hashcat
08:45 - Enumerating LDAP with LDAPSEARCH
10:55 - Discovering the cascadeLegacyPwd LDAP Attribute…