📚
Vulnerabilidades
search
Ctrlk
  • Symfony
  • Inadecuada configuración de certificados digitales
  • CSRF
  • WAF Bypassing with Unicode Compatibility
  • SSRF
  • Nginx misconfigurations
  • Oracle
  • Advanced CORS Exploitation Techniques
  • Tomcatchevron-right
  • Command Injection
  • Nessus
  • Cisco phone systems
  • Windows
  • Recon Avanzadochevron-right
  • XSSchevron-right
  • ORACLE BI
  • SAP Pentestchevron-right
  • SQLi Avanzadochevron-right
  • Wifi Hackingchevron-right
  • Cloudflare Bypasschevron-right
  • Bypass 2FA Mechanism
  • Bug Bountychevron-right
  • ¡La mentalidad de Pentester!
  • Nuclei
  • Revisión externachevron-right
  • Ingeniería Socialchevron-right
  • Otroschevron-right
  • NFS Mount
  • CAPTCHA Bypass
gitbookPowered by GitBook
block-quoteOn this pagechevron-down

Windows

Cracking de passwords

https://www.zonasystem.com/2019/11/passwords-cracking-hashes-ntlm-ntds-de-active-directory-con-secretsdump-hashcat.htmlarrow-up-right

Relaying

https://www.cyberonesecurity.com/blog/from-the-trenches-relaying-passwords-for-the-winarrow-up-right

Crackmapexec Cheatsheet

https://cheatsheet.haax.fr/windows-systems/exploitation/crackmapexec/arrow-up-right

PreviousCisco phone systemschevron-leftNextRecon Avanzadochevron-right

Last updated 3 years ago

Was this helpful?

Was this helpful?