(function(i,s,o,g,r,a,m){ i['GoogleAnalyticsObject']=r; i[r]=i[r]||function(){(i[r].q=i[r].q||[]).push(arguments)}, i[r].l=1*new Date(); a=s.createElement(o),m=s.getElementsByTagName(o)[0]; a.async=1; a.data-privacy-src=g; m.parentNode.insertBefore(a,m) })(window,document,'script','//www.google-analytics.com/analytics.js','ga'); ga('create', 'UA-132428928-1', 'auto'); ga('send', 'pageview');

Demo

Bsides PR 2015 – Fun with Tor : How anonymity services complicate actor attribution CompSec Direct

2022-06-13T18:35:49-04:00

Hello from Puerto Rico. Here are our slides from Jose Fernandez’s talk on Tor and attribution. We are very exited to have participated in BSides PR 2015, and look forward to speaking again in the future. By the time we got to the beach, the Internet is hopefully in a slightly better state than we left [...]

Bsides PR 2015 – Fun with Tor : How anonymity services complicate actor attribution CompSec Direct2022-06-13T18:35:49-04:00

BSides Charm 2015 – Mass Hunting and Exploitation with PowerShell Slides CompSec Direct

2022-06-13T18:36:39-04:00

Hello Everyone, Here are the slides from our presentation at Bsides Charm 2015. We look forward to coming back next year for another excellent community driven event.Mass Hunting with Powershell

BSides Charm 2015 – Mass Hunting and Exploitation with PowerShell Slides CompSec Direct2022-06-13T18:36:39-04:00

How to exploit Domain Controllers with MS14-068 / From Zero 2 Hero

2022-06-13T18:39:44-04:00

Hello! This is jfer from compsec direct. I would like to show you how to leverage the new Kerberos exploit against Windows domain controllers called ms14-068. This vulnerability allows a user with domain credentials to forge a Kerberos ticket and receive domain admin privileges via the forged ticket. I want to thank Sylvain Monné aka Bidord [...]

How to exploit Domain Controllers with MS14-068 / From Zero 2 Hero2022-06-13T18:39:44-04:00
Go to Top