How to exploit Domain Controllers with MS14-068 / From Zero 2 Hero

By |2019-10-16T17:52:56-04:00December 7th, 2014|Categories: Demo, Hacking|Tags: , , |

Hello! This is jfer from compsec direct. I would like to show you how to leverage the new Kerberos exploit against Windows domain controllers called ms14-068. This vulnerability allows a user with domain credentials to forge a Kerberos ticket and receive domain admin privileges via the forged ticket. I want to thank Sylvain Monné aka Bidord [...]

Comments Off on How to exploit Domain Controllers with MS14-068 / From Zero 2 Hero

Dark Reading – How Retro Malware Feeds the New Threat Wave

By |2017-05-30T21:01:17-04:00October 7th, 2014|Categories: Hacking|

Old-school exploits used in new ways are placing fresh demands for intel-sharing among infosec pros and their time-tested and next-gen security products Read More

Comments Off on Dark Reading – How Retro Malware Feeds the New Threat Wave

IT threat evolution Q2 2014 – Kaspersky

By |2017-05-30T21:01:37-04:00September 7th, 2014|Categories: Hacking, Reports|Tags: , , , |

Please take time to read this insightful publication by David Emm, Roman Unuchek, Victor Chebyshev, Maria Garnaeva and Denis Makrushin from Kaspersky Labs. The publication offers unparalleled insight and examples of current evolving threats through the info sec lens. Click here to download

Comments Off on IT threat evolution Q2 2014 – Kaspersky

Ransomware going strong, despite takedown of Gameover Zeus – ArsTechnica

By |2017-05-30T21:01:37-04:00September 7th, 2014|Categories: Hacking|Tags: , , , |

Despite numerous public takedowns, cyber criminals will continue to extort users by leveraging their own data as ransom. Click Here for Original Post

Comments Off on Ransomware going strong, despite takedown of Gameover Zeus – ArsTechnica

Advanced Persistent Threat Awareness Study Results 2014 – ISACA

By |2017-05-30T21:01:37-04:00August 29th, 2014|Categories: Hacking|

According to the study by ISACA, 15% of companies are prepared, or feel prepared to handle APT's. Download Report Here

Comments Off on Advanced Persistent Threat Awareness Study Results 2014 – ISACA

Dark Reading – How to Defend Your Network from Advanced Persistent Threats (APTs)

By |2017-05-30T21:01:38-04:00August 29th, 2014|Categories: Hacking|

Good presentation from Bit9 on using sandboxing to potentially identify APT's. Click Here

Comments Off on Dark Reading – How to Defend Your Network from Advanced Persistent Threats (APTs)

ArsTechnica – How elite hackers (almost) stole the NASDAQ

By |2017-05-30T21:01:38-04:00July 18th, 2014|Categories: Hacking|Tags: , , |

I recall seeing a NASDAQ trading blackout a few months ago. Although NASDAQ claimed the 4 hour blackout was the result of a high speed trading glitch, it is more probable that these incidents are related given this article. See full article here:  http://arstechnica.com/security/2014/07/how-elite-hackers-almost-stole-the-nasdaq/

Comments Off on ArsTechnica – How elite hackers (almost) stole the NASDAQ