Home Subscribe

Kevin Dick

13 posts
← Newer Posts Page 3 of 3

USB Drives, Desktop.ini, and NTLM hashes

USB dropping is one of those famous 'hacker' moves from the 2000's that lives on in infamy. Although it is not our »

18 November 2016

Penetration Testing with Splunk: Leveraging Splunk Admin Credentials to Own the Enterprise

Update 7/21/2016: Splunk has released an excellent blog post covering the best practices for deploying Splunk securely: http://blogs.splunk.com/2016/07/10/ »

20 May 2016

Dissecting Veil-Evasion Powershell Payloads and Converting to a Bind Shell

There are many popular and powerful payloads available to us as penetration testers, and oftentimes we use them without fully understanding how they work. This post »

07 May 2016
← Newer Posts Page 3 of 3
Tevora © 2025