Room362 - room362.com - Room362
General Information:
Latest News:
Volume Shadow Copy NTDS.DIT Domain Hashes Remotely - Part 2 10 Jun 2013 | 06:55 pm
Part 2, we have the NTDS.dit file and the SYSTEM.hive file. First we need a few tools: From: http://www.ntdsxtract.com/ Download: http://www.ntdsxtract.com/downloads/ntdsxtract/ntdsxtract_v1_0.zip ...
Volume Shadow Copy NTDS.dit Domain Hashes Remotely - Part1 10 Jun 2013 | 06:11 pm
This and part 2 are mostly just an update to http://pauldotcom.com/2011/11/safely-dumping-hashes-from-liv.html but without the need for VSSOwn, that and we are doing it remotely without the need for s...
Using Mimikatz Alpha or Getting Clear Text Passwords with a Microsoft Tool 7 Jun 2013 | 08:00 pm
Mimikatz is now built into Metasploit's meterpreter, you can do load mimikatz from the meterpreter prompt, but if you don't want to go through the hassle of dealing with AV, reverse or bind payloads, ...
Query all windows services config from the command line 30 May 2013 | 07:56 am
This is how I did it: for /f "tokens=5 delims=\" %A in ('reg query HKLM\SYSTEM\CurrentControlSet\Services') do sc qc %A Let me know if you know of a better way. If you don't know why this could be ...
Sessiondump Meterpreter Extension 8 Apr 2013 | 02:58 pm
Mimikatz is awesome right, so is WCE. But both have one fatal flaw, even though you can execute them in memory {link} - you still have to have the binaries, remember the command to execute it in memor...
Metasploit Mastery @BlackHatEvents USA 2013 19 Mar 2013 | 06:38 pm
Just a quick post to say that egypt and I will be giving Metasploit Mastery twice (2 x 2 day sessions) at BlackHat USA 2013. Come out and get your Metasploit on in Vegas w/ us Linky: http://www.black...
Length Sorting Wordlists 19 Mar 2013 | 12:01 am
This is one of those stupid simple things that are easy to forget so I'm posting it here. Wordlists and dictionaries are awesome for cracking password hashes, and although, thanks to things like Mimik...
Mounting NFS shares through Meterpreter with NfSpy 5 Mar 2013 | 03:21 am
You've found an NFS share on a pentest, it's sharing out your target's home directories (/home) and some SAN with all of the Windows AD users "home" directories under /volumes/users/. You only have a ...
Suggestions on what to do when a service you use gets compromised 3 Mar 2013 | 02:02 am
It seems like every week there is a new compromise of some service or another. But as a user what are you supposed to do with this knowledge? Here are some suggestions on things to do or think about w...
Blocking Java Exploits, Malicious Signed Applets, and 0days 27 Feb 2013 | 08:42 pm
The following has been a concept for me for a long time and recently I tweeted the idea which really put me under the fire to prove it. (re: justanidea hashtag) And a few people came up with some ver...