mercredi 16 octobre 2013

Using PowerShell to Copy NTDS.dit / Registry Hives, Bypass SACL’s / DACL’s / File Locks

(this abstract is from an external source)







Currently there are a few ways to dump Active Directory and local password hashes. Until recently, the techniques I had seen used to get the hashes either relied on injecting code in to LSASS or using the Volume Shadow Copy service to obtain copies of the files which contain the hashes.



Read more => http://clymb3r.wordpress.com/2013/06/13/using-powershell-to-copy-ntds-dit-registry-hives-bypass-sacls-dacls-file-locks/

mardi 15 octobre 2013

Burp’s Session Handling Mechanisms

(this abstract is from an external source)







Web applications, nowadays, handle sessions and state by implementing session expiration and sessionid lifecycle in a more secure manner to avoid security issues such as session hijacking. They will invalidate your session based on idle timeout or absolute timeout as suggested by OWASP.



Read more => http://resources.infosecinstitute.com/burps-session-handling-mechanisms/

Motorola Is Listening

(this abstract is from an external source)







In June of 2013, I made an interesting discovery about the Android phone (a Motorola Droid X2) which I was using at the time: it was silently sending a considerable amount of sensitive information to Motorola, and to compound the problem, a great deal of it was over an unencrypted HTTP channel.



Read more => http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html

The DOs and DON’Ts of PKI – Microsoft ADCS





DON’T install PKI without a detailed plan. Ask yourself what you need it for, what features will you use and would it be scalable enough in the future. DO use Windows Server Enterprise Edition for Active Directory users enrollment.



http://kazmierczak.eu/itblog/2012/08/22/the-dos-and-donts-of-pki-microsoft-adcs/

Hierarchies in PKI





A PKI hierarchy can have one or more tiers. In a single tier PKI environment your only CA server will be the Root CA. If you have more tiers your Root CA will issue subordinate CA certificates CA servers below the root.



http://networklore.com/hierarchies-in-pki/