Yaksas Security

Cyber Security Research

  • Yaksas Security Home
  • Home
  • Yaksas Security Classroom
  • Learn Adversary Emulation
  • Contact Yaksas

Uday Mittal May 6, 2018 Leave a Comment

Steal Windows Credentials using a PDF File (NTLM Hash)

This video demonstrates the recently discovered NTLM hash leak vulnerability via the PDF files. Uday MittalUday Mittal is a cybersecurity professional with rich working experience working with various industries including telecom, publishing, consulting and finance. He holds internationally recognized certifications such as CRTP, OSCE, OSCP, CISSP, CISA, CISM, CRISC among others. He speaks on cybersecurity […]

Filed Under: Awareness Tagged With: BadPDF, NTLM Hash leak, Password, pdf, phishing, Steal windown username and password, username, Windows

7 Cardinal Sins: Password Edition

Uday Mittal April 6, 2016 Leave a Comment

7 Cardinal Sins: Password Edition

On a normal day, an average computer user is required to input password to at least five different places (Windows, e-mail, social media, online banking, e-commerce). More often than not these passwords are same and are hardly changed once set. Passwords are the most abused and vulnerable security technology yet they can’t be replaced. They could […]

Filed Under: Awareness Tagged With: pass-phrases, Password, password sharing, Security, two-factor authentication

Optin Form

Search

Follow us on Twitter

My Tweets

Categories

Tags

(ISC)2 Active directory adsecurity adsi adsisearcher adversary emulation Android attack active directory awareness blue whale challenge Certification CISSP Cloud security command and control crte crtp cyber-warfare Cyber Security cybersecurity Cybersecurity books Cybersecurity Cannon domain enumeration ethical hacking forest enumeration hacker Information Security ISACA Kali Linux Mass Surveillance Narendra Modi offensive security Online Safety opsec Password Penetration Testing pentest poshc2 powersploit Powerview privacy red team red teaming Risk Management Social Engineering user enumeration

Top Posts

  • Red Team Operations Attack Lifecycle
    Red Team Operations Attack Lifecycle
  • Mona.py for exploit devs: 6 must know commands
    Mona.py for exploit devs: 6 must know commands
  • DCPP: Everything You Need to Know
    DCPP: Everything You Need to Know
  • 7 Ways to Cover Your Device's Camera
    7 Ways to Cover Your Device's Camera
  • AD Exploitation using ADSI - Part 1 (Introduction)
    AD Exploitation using ADSI - Part 1 (Introduction)
  • ADSISearcher (Part 2)
    ADSISearcher (Part 2)

© Copyright 2020 ElliteDevs · All Rights Reserved · Powered by WordPress