Local networks have lots of things on them that we as penetration testers can exploit. In a Windows environment there are often protocols (LLMNR and NBT-NS) which can be easily exploitable. Effectively you are running a man in the middle attack and using that to intercept traffic being sent by users in order to capture… Continue reading Grabbing NTLM hashes with Responder then what?
Here is how I did in the new condensed table format. TargetSummary11k steps a dayI hurt my ankle in March. I am out of this game for the foreseeable.150 active minutes per weekWeek 1 – No.Week 2 - No.Week 3 - No. Week 4 - No. I am not getting "active" minutes (on the FitBit… Continue reading Captain’s Log: May 2021