Category: Blog Posts

Securing Internal Networks: Preventing LLMNR and NBNS Spoofing

Introduction Internal network environments are vast, complex, and unique per organization. Although unique, most internal network environments face being vulnerable to the same high impact issues that others do. One of the biggest threats to internal network environments today is being susceptible to Link-Local Multicast Name Resolution (“LLMNR”) and NetBIOS Name Service (“NBNS”) Spoofing attacks….

Read more

Preventing Mass Credential Harvesting: CredCrack, Mimikatz, Pass-the-Hash

Introduction This blog post covers best practices on how to secure a network to prevent mass credential harvesting attacks such as the techniques used in CredCrack. We have included best practices and divided them into two sections: Password and Account Security and Workstation Segmentation. Implement as many of the best practices listed below to ensure…

Read more

Domain Administrator in 17 seconds

Introduction Obtaining domain administrative privileges on a security assessment is a goal that many consultants desire. It is what fills us with excitement, as we know that the real fun is about to begin. After several assessments of crunching and spending time obtaining domain administrator privileges I decided I wanted to expedite this process. CredCrack…

Read more

Installing MinGW (gcc, g++) on Kali Linux to Compile Windows Code

Introduction It is possible to compile windows code natively in Kali using MinGW compiler and Wine. While MinGW comes already installed and configured for users in Backtrack, it does not in Kali. Let’s go over how to install and configure MinGW for Kali and how to use it to compile windows code, but first some…

Read more

Buffer Overflow: Smashing the Stack Tutorial

Introduction Buffer Overflows or stack smashing are common attack vectors. There are numerous tutorials online on how to perform buffer overflows and the theories behind them, but in this example we’ll dive in a little deeper. What you’ll need: VMware or Virtualbox Kali Linux Windows OS (I used Windows 7) Immunity Debugger Vulnerable version of…

Read more

Let's talk about your
security needs

Send us an email and we’ll get the process started to protect your company

contact us