-
Microsoft BlueHat – 2014
– Reality Bites – The Attacker’s View of Windows Authentication and Post Exploitation – SlideShare
-
BlackHat / Defcon WallOfSheep – 2014
– Abusing Microsoft Kerberos – Sorry You Guys Don’t Get It – pptx / pdf / SlideShare
-
RMLL / LSM – 2014
– mimikatz @ rmll pptx / pdf / SlideShare
-
Sthack – 2014
– mimikatz @ sthack pptx / pdf / SlideShare
-
MISC Mars/Avril – 2013
-
Afterwork OSSIR – 2013
– mimikatz @ ossir pptx / pdf / SlideShare
-
Application Security Forum – Western Switzerland – 2012
– mimikatz @ asfws pptx / pdf / SlideShare
-
PhDays – 2012
– mimikatz @ phdays pptx / pdf / SlideShare
Superbe travail !!!
Merci pour toutes ces explications, vraiment très intèressant
SachaDee
Ping : Why do I always use 32-bit payloads? | Strategic Cyber LLC
Ping : Mimikatz extension for Metasploit | Security Art Work
Yes, it’s all very well showing what mimkatz can do, but how to block it?
don’t run it
mimikatz or Active Directory?
Ping : 神器mimikatz发布2.0 | 安全军火库
Ping : Mimikatz and Active Directory Kerberos Attacks » Active Directory Security
Ping : Exploiting MS14-068 Vulnerable Domain Controllers Successfully with the Python Kerberos Exploitation Kit (PyKEK) » Active Directory Security
Merci . Très sincèrement .
Salut, je viens de tomber sur ton blog grace à la série Mr.Robot E09S2 (15min 12sec)