Metasploit PsExec pass the hash attack demonstration: 1.HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 2.Add a new DWORD (32-bit) key named ‘ LocalAccountTokenFilterPolicy’ and set the value to 1 regini HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System LocalAccountTokenFilterPolicy = REG_DWORD 1 C:\Windows\system32>reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System /v LocalAccountTokenFilterPolicy /t REG_DWORD /d 1 reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System /v LocalAccountTokenFilterPolicy /t REG_DWORD /d 1 The operation completed successfully. I firstly used existing …
Günlük Arşiv: Eylül 6, 2015
Eyl 06
Strategicsec Pentester Candidate Program
Etiketler: metasploit, network, pass the hash, psexec, security, siber güvenlik, strategicsec
Kategoriler
Son Yazılar
- CVE-2017-0145 Badlock Açıklığı Otomatik olarak tespit etme Mayıs 3, 2017
- Pluck v1.0 Vulnhub CTF Writeup Nisan 7, 2017
- hackfest2016: Quaoar CTF WriteUp Mart 16, 2017
- GOLLER ARDI ARDINA GELİNCE ARTNİYET BAŞ GÖSTERDİ Ekim 28, 2015
- CEH Android Quiz Ekim 22, 2015
