A common requirement on internal network assessments is to know the fully qualified Windows domain name of the network. This is trivial to obtain if…
Just another hacking blog...
Posts in this category are about tools and techniques that I find useful during a Penetration Test
A common requirement on internal network assessments is to know the fully qualified Windows domain name of the network. This is trivial to obtain if…
Group Policy preferences were introduced by Microsoft in Windows 2008 allowing administrators to configure unmanaged settings (settings which the user can change) from a centrally…
On a recent Web application test I encountered a new challenge. The Web application presented a Web API intended to be used by a mobile…
When releasing tools, and proof of concepts, to the industry and more often to clients, I find I need to provide a standalone executable that can…
TLDR: Python script to automate the extraction of hashes from ntds.dit and system files. Available here : https://bitbucket.org/grimhacker/esedbxtract. During an internal Penetration Test, once I’ve…
I recently had need to interpret bitfields with Python. I’m quite happy with the 3 lines of code that I came up with so I thought…
TL;DR: I’ve written a Windows Domain Enumeration Tool, you can get it from here: https://bitbucket.org/grimhacker/nettynum. Enumerating information from the Windows Domain is nothing new and has…