DOCUMENT RESOURCES FOR EVERYONE
Documents tagged
Technology BlueHat 2014 - The Attacker's View of Windows Authentication and Post Exploitation

1. Reality BitesThe Attacker’s View ofWindows Authentication and Post-exploitationChris CAMPBELL `obscuresec`Benjamin DELPY `gentilkiwi`Skip DUCKWALL `passingthehash` 2.…