Metasploit mailing list archives
Defcon Video
From: axnjxnind at gmail.com (axn jxn)
Date: Thu, 13 Sep 2007 16:02:32 -0400
I second that. I laughed out loud when I saw how easy it was. Really wish I could have seen the whole presentation live at BH. Nice work. On 9/13/07, Thierry Zoller <Thierry at zoller.lu> wrote:
Dear ALL, Actually the very last bit of the video, the -I-use-the-WPAD-MiTM-to-setup-proxy-and-serve-unc-path-so-that-windows-sends-me-the-ntlm-hash-I-use-that-challenge-to-authenticate-and-upload-connect-back-code just blew my mind. Excellent! Techniques knwon but very well combined (and implemented!) Thierry Zoller -- http://secdev.zoller.lu Thierry Zoller Fingerprint : 5D84 BFDC CD36 A951 2C45 2E57 28B3 75DD 0AC6 F1C7
Current thread:
- Defcon Video H D Moore (Sep 11)
- Defcon Video Konrads Smelkovs (Sep 11)
- Defcon Video Thierry Zoller (Sep 13)
- Defcon Video axn jxn (Sep 13)
- Defcon Video Thierry Zoller (Sep 13)
- Defcon Video Konrads Smelkovs (Sep 12)
- Defcon Video marc_pascual at support.trendmicro.com (Sep 12)
- Defcon Video Suman Saini (Sep 12)
- Defcon Video Patrick Webster (Sep 12)
- Defcon Video Suman Saini (Sep 12)
- Defcon Video H D Moore (Sep 12)
- Defcon Video marc_pascual at support.trendmicro.com (Sep 12)
- Defcon Video Konrads Smelkovs (Sep 11)
- Defcon Video H D Moore (Sep 12)
- Defcon Video kellicot at umich.edu (Sep 14)
- Defcon Video Giorgio Casali (Sep 18)