As you would expect, office printers are often identified when conducting a penetration test of an office network. These devices often seem to be overlooked…
Just another hacking blog...
As you would expect, office printers are often identified when conducting a penetration test of an office network. These devices often seem to be overlooked…
John the Ripper is an excellent password cracking tool that I regularly use during penetration tests to recover plaintext passwords from multiple hash formats. I…
I have multiple machines, some run Windows and some run Fedora. I also need to keep a significant amount of my data encrypted l, and I…
I recently purchased a Microsoft Surface Pro 4 which came with Windows 10. BitLocker was enabled by default during setup, however the recovery key was…
LanManager is an obsolete hashing format used by older versions of Windows. It is extremely weak as it first splits the password into two 7…
A recent project of mine called for optical character recognition. After a brief Google search and a personal recommendation I decided to use tesseract because it…
At the time of writing I am working on a tool that utilities rdpy. I encountered some problems installing it so I thought I’d document…
TL;DR: Architecture is important (duh), download the 64bit exe from here. I recently had a horrendous time trying to install python-ldap on Windows 7 64bit so…