Quantcast
Channel: ifconfig.dk
Browsing latest articles
Browse All 11 View Live

Banner Grabbing and Emailing via Telnet

Telnet is a old network protocol which has been around longer then the internet. It was created for the purpose of remote access for network resources. It sends its data in plain text and is therefore...

View Article



FreeRDP – RD Gateway client for Linux

If you are Googling for software that allows you to use remote desktop from a Linux OS through a RD Gateway to another server – Stop! I spend hours doing the same with no luck. I tried out a bunch of...

View Article

ActivPasswordChanger

In a former tutorial, I showed how to hack Windows 7 Account Password without any tools at all. In that tutorial I mentioned that there also where tools available to do this. Since I just lost the...

View Article

MS12-020 RDP Vulnerability PoC & Analysis

In March 2012 a security breach was released regarding a vulnerability in the Remote Desktop Protocol (RDP). The vulnerability related to almost all Windows platforms, and was later released under...

View Article

Local File Inclusion & Remote Command Execution

Local File Inclusion (LFI) is an exploit, which involves gaining access to local system files of a web server, though a website. The vulnerability occurs when a website does not have proper validating...

View Article


Process Explorer

Process Explorer is like Task Manager on drugs. I have been using it for years, and every time I decide to get to the bottom of it, I get sidetracked because it has so many uses. In this tutorial, we...

View Article

Chocolatey – Apt-get for Windows

I was at a lecture introducing some of the new features of Powershell 5. One of the top selling points was the OneGet module. OneGet is a package manager for Windows much like Apt-get for *nix systems....

View Article

Mimikatz

Stored user credentials in Windows are normally not visible in plaintext for obvious reasons. But Windows stores the password in plaintext in the Local Security Authority Subsystem Service (LSASS) for...

View Article


WPS Pixie Dust Attack

I have written about the flaw in the WPS system a few times. But a new WPS flaw has surfaced, which enables offline brute forcing of the WPS PIN, also called WPS Pixie Dust Attack. When the Registrar...

View Article


Recovering Windows Servers

This tutorial focuses on the built-in tools in Windows, which you can use when a Windows server is not booting correctly. Booting to Safe mode Booting to safe mode eliminates all unnecessary boot up...

View Article
Browsing latest articles
Browse All 11 View Live




Latest Images