Bad Kitty How Mimikatz is used to exploit your network and what you can do about it. For this blog post I wanted to highlight a common attack vector that we often use in our penetration testing. My goal is to run through the process at a high level, and then cover some of the steps you can take to mitigate your risk. Specifically, this post will cover a memory scraping utility known as Mimikatz. Mimikatz has been out in the wild for roughly five years now, but its ability to obtain passwords is still relevant today. The tools effectiveness [...]
About Greg PetersonThis author has not yet filled in any details.
So far Greg Peterson has created 2 blog entries.
Going Next Level The shape of the internet as we know it is constantly changing and evolving to meet the growing demands of business and entertainment. This constant growth however has added levels of complexity to Information and Network Security which can lead to complex and mismanaged network environments. One of the newer products to hit the Security scene that is hoping to help reduce those layers is a Next Generation Firewall. In the past we have relied on a "source, destination, service/port" format for rule structure. However as the Internet has aged the complexly of modern web traffic and the [...]