Everything was so neat, clean and systematic that even a newbie can understand this technique. Moreover explaining how to prevent this kind of attacks is like a bonus tip. Well done and keep posting such videos.
Keen to know your thoughts on a commonly used tool for CLI internet access via outbound proxy (cntlm), one options of the confit options would be store your ntlm hash on its configuration file in plain text.
I have been trying to understand pass the hash until I watch this your video 😁you are the best
Everything was so neat, clean and systematic that even a newbie can understand this technique. Moreover explaining how to prevent this kind of attacks is like a bonus tip. Well done and keep posting such videos.
Concise presentation! Thank you for sharing Ammar.
Explained very well. Thank you!
great explanation, will done,
create material thanks for the great job
Can you do a demo on the pass-the-hash alert in Defender for Identity?
Keen to know your thoughts on a commonly used tool for CLI internet access via outbound proxy (cntlm), one options of the confit options would be store your ntlm hash on its configuration file in plain text.
Well explained.. thanks
Great video
Use GameCrook, it works 100%.