
g-laurent.blogspot.com
Laurent Gaffié blogThis blog reflects my own opinions.
http://g-laurent.blogspot.com/
This blog reflects my own opinions.
http://g-laurent.blogspot.com/
TODAY'S RATING
>1,000,000
Date Range
HIGHEST TRAFFIC ON
Saturday
LOAD TIME
0.3 seconds
16x16
32x32
PAGES IN
THIS WEBSITE
19
SSL
EXTERNAL LINKS
149
SITE IP
216.58.194.161
LOAD TIME
0.253 sec
SCORE
6.2
Laurent Gaffié blog | g-laurent.blogspot.com Reviews
https://g-laurent.blogspot.com
This blog reflects my own opinions.
Laurent Gaffié blog: More on PCredz..
http://g-laurent.blogspot.com/2014/06/more-on-pcredz.html
This blog reflects my own opinions. Saturday, June 7, 2014. Pcredz was designed to dump useful information on the fly, from a pcap file or from a pcap directory. Unlike tools like, for example Breachprobe, Pcredz is highly effective and fast just to meet your pentest needs. What Pcredz does right now from a live interface or pcap file:. Identify Card Holder Data (CHD) on any port. Dump NTLMv1/v2 (DCE-RPC,SMBv1/2,LDAP,MSSQL,. HTTP,etc) hashes on any protocol and port. Dump HTTP Basic (any port).
Laurent Gaffié blog: Microsoft DHCP INFORM Configuration Overwrite
http://g-laurent.blogspot.com/2014/05/microsoft-dhcp-inform-configuration.html
This blog reflects my own opinions. Wednesday, May 28, 2014. Microsoft DHCP INFORM Configuration Overwrite. Title: Microsoft DHCP INFORM Configuration Overwrite. Issue type: Protocol Security Flaw. Discovered by: Laurent Gaffié. Advisory by: Laurent Gaffié. Issue status: Patch not available. A vulnerability in Windows DHCP ( http:/ www.ietf.org/rfc/. Was found on Windows OS versions. Ranging from Windows 2000 through to Windows server 2003. This vulnerability allows an attacker to remotely. Set a DWORD r...
Laurent Gaffié blog: Breaking MSFT Kerberos With Responder
http://g-laurent.blogspot.com/2014/04/breaking-msft-kerberos-with-responder.html
This blog reflects my own opinions. Wednesday, April 9, 2014. Breaking MSFT Kerberos With Responder. I've been working on a way to get MS Kerberos v5 hashes via the Browser protocol automatically with no user interaction on a given network. Click on the pics if they don't display correctly). Often you see these requests in wireshark on an internal penetration test:. So I came up with a tool that automates kerberos' connection for these:. Which shows up like this in Wireshark:. April 11, 2014 at 12:43 AM.
Laurent Gaffié blog: Responder v2.0.9
http://g-laurent.blogspot.com/2014/06/responder-v209.html
This blog reflects my own opinions. Monday, June 9, 2014. Responder v2.0.9. Responder is an Active Directory/Windows environment takeover tool suite that can stealthily take over any default active directory environment (including Windows 2012) in minutes or hours. Most of the attacks in this tool are hard to detect and are highly successful. Responder attacks 5 Windows core protocols:. LLMNR Poisoning (Windows =vista). Netbios Name Service Poisoning (NBT-NS poisoning, any by default). MSSQL Auth server&...
Laurent Gaffié blog: [Updated]Windows Vista/7 : SMB2.0 NEGOTIATE PROTOCOL REQUEST Remote B.S.O.D.
http://g-laurent.blogspot.com/2009/09/windows-vista7-smb20-negotiate-protocol.html
This blog reflects my own opinions. Monday, September 7, 2009. Updated]Windows Vista/7 : SMB2.0 NEGOTIATE PROTOCOL REQUEST Remote B.S.O.D. Release date: September 7th, 2009. Discovered by: Laurent Gaffié. Windows Vista, Server 2008. SMB20 NEGOTIATE PROTOCOL REQUEST Remote B.S.O.D. Windows vista and newer Windows comes with a new SMB version named SMB2. See: http:/ en.wikipedia.org/wiki/Windows Vista networking technologies#Server Message Block 2.0. IV PROOF OF CONCEPT. From socket import socket. X57 x4f ...
TOTAL PAGES IN THIS WEBSITE
19
Details are still coming in: Detecting abnormal executable files using binary code mining
http://antoxar.blogspot.com/2013/02/detecting-abnormal-executable-les-using.html
Details are still coming in. IDA, windbg tips. CTF tasks and so on. Thursday, February 7, 2013. Detecting abnormal executable files using binary code mining. Rechkov. Lomonosov Report. PS Please don't shy to add comments and ideas! Subscribe to: Post Comments (Atom). Detecting abnormal executable files using binary co. Exploring and exploiting Lenovo firmware secrets. What does this command? Черный ящик и внедрение ошибок на Black Hat Trainings. VNSECURITY TEAM (Vietnam Internet Security Research Team).
Details are still coming in: April 2011
http://antoxar.blogspot.com/2011_04_01_archive.html
Details are still coming in. IDA, windbg tips. CTF tasks and so on. Tuesday, April 12, 2011. IDAPython and CTF Task. Few month ago I read post “IDA Python = Love” in “Hacker” journal and been a pist off, because it is translate from HexBlog. And didn't told about another cool IDAPython feature – Appcall. Which appear in IDA 5.6. Here is user guide. Appcall is a mechanism used to call functions inside the debugged program from the debugger or your script as if it were a built-in function. If you have a He...
Details are still coming in: July 2011
http://antoxar.blogspot.com/2011_07_01_archive.html
Details are still coming in. IDA, windbg tips. CTF tasks and so on. Wednesday, July 20, 2011. Ciss Hot Summer has a lot of different ways to do, but I choose bug hunting and trace building. Some researches make trace with Temu, some use debuggers: MyNav, ProcessStalker. But, for kernel purpose, as you know, we need to use WinDbg. Big advantage that Windbg works everywhere. It’s not a secret that kernel researches use Windbg for rootkit hunting and Analyzing. You can find a lot of scripts in KDAR. Next ta...
Platen's blog: SSH2 Protocol in python - Install Paramiko
http://h-jafari.blogspot.com/2010/05/ssh2-protocol-in-python-install.html
Saturday, May 1, 2010. SSH2 Protocol in python - Install Paramiko. For connect to SSH in must import Paramiko modules. Paramiko is a module for python 2.2 (or higher) that implements the SSH2 protocol for secure (encrypted and authenticated) connections to remote machines. Or install from source:. Paramiko-1.7.6.tar.gz. Xzf paramiko-1.7.6.tar.gz. Python setup.py build. Python setup.py install". Installing on ubuntu video: here. Here’s a simple example:. Ssh = paramiko. SSHClient. From private key file.
Platen's blog: March 2010
http://h-jafari.blogspot.com/2010_03_01_archive.html
Wednesday, March 17, 2010. با سلام ؛. سال جدید رو خدمت همه ی دوستان و آشنایان که به اینجا سر میزنن تبریک میگم. برای تک تک دوستان آرزویه سال خوبی رو دارم. یکم سرم شلوغه ایشالا از این به بعد این وبلاگ رو هفته ای یه بار آپدیت می کنم. Subscribe to: Posts (Atom). My Name is Hoshang jafari. I work as an IT Security Specialist in Iran, i working with various companies to help them accomplish their projects related. View my complete profile. I look these blog's. ADD / XOR / ROL. An attempt at fixing Wassenaar.
Platen's blog: August 2011
http://h-jafari.blogspot.com/2011_08_01_archive.html
Tuesday, August 2, 2011. Binary Code Modification / Patching. همانطور که می دانید وقتی یک فایل. اجرا می شود به همان. روی هارد قرار داشته بر روی. قرار می گیرد. بنابراین اگر ما بتوانیم. به حافظه دسترسی پیدا کنیم می توانیم به صورت مستقیم تغییراتی را داخل. برنامه در حین اجرا انجام دهیم. به این کار. مهندسی معکوس روش های و تکنیک های بسیار زیادی دارد ما فقط در این مطلب تکنیک. را مورد بررسی قرار می دهیم. ابزار این کار چیست ؟ در هر مهندسی معکوس ما نیاز. به ابزار جدایی ناپذیر این کار یعنی (. IDA Pro , Ollydbg.
PeTIK Team: november 2009
http://petikteam.blogspot.com/2009_11_01_archive.html
PeTIK Team official blog. 2009 november 21., szombat. Wine install to Mac OSX 10.6 Snow Leopard (Draft Only). Sudo port install wine-devel universal. Macbook:Downloads user$ sudo port install wine-devel universal. Computing dependencies for wine-devel. Error: You cannot install wine-devel for the architecture(s) i386. Error: because /opt/local/lib/libXxf86vm.dylib only contains the architecture(s) x86 64. Error: Try reinstalling the port that provides. With the universal variant. 2 go to the mplayer dire...
Platen's blog: Acrobat Reader memory corruption advisory / analysis
http://h-jafari.blogspot.com/2010/09/acrobat-reader-memory-corruption.html
Monday, September 13, 2010. Acrobat Reader memory corruption advisory / analysis. Discovered a vulnerability in Adobe Reader and Adobe Acrobat Could Allow For Remote Code Execution. Adobe Acrobat 9.3.4 for Windows. Adobe Acrobat 9.x. Adobe Acrobat 8.x. Adobe Reader 7.x. Access violation - code c0000005 (first chance). First chance exceptions are reported before any exception handling. This exception may be expected and handled. Eax=00000000 ebx=00000001 ecx=02ae1314 edx=020c4bc8 esi=02adb470 edi=0012f4b4.
Platen's blog: Anyzip (.zip) v1.1 0day Poc (SEH)
http://h-jafari.blogspot.com/2010/04/anyzip-zip-v11-0day-poc-seh.html
Friday, April 9, 2010. Anyzip (.zip) v1.1 0day Poc (SEH). Anyzip (.zip) 0day Poc (SEH). Homepage : www.tbsoftinc.com. Download : www.tbsoftinc.com/download/anyzip.exe. Version : 1.1. Tested Os : Windows XP SP1/SP3 EN. Usage : Python anyzip.py. Mail : Bug@ItSecTeam.com. Web : WwW.ITSecTeam.com. Forum : WwW.forum.itsecteam.com. Header 1 =("x50 x4B x03 x04 x14 x00 x00". X00 x00 x00 xB7 xAC xCE x34 x00 x00 x00". X00 x00 x00 x00 x00 x00 x00 x00". Header 2 = (" x50 x4B x01 x02 x14 x00 x14". X00 x01 x00 x01 x00".
TOTAL LINKS TO THIS WEBSITE
149
Blog de G-Lauraa - Lauraa - Skyrock.com
Mot de passe :. J'ai oublié mon mot de passe. Plus d'actions ▼. S'abonner à mon blog. Création : 12/03/2011 à 18:05. Mise à jour : 27/08/2011 à 11:58. Blog d'une ado de 15ans;. Je ne suis pas jolie, et j'emmerde ceux qu'ils ne sont pas content. Je ne cherche pas les compliments. Je n'aime pas ça d'ailleurs,. On ne sait jamais si ils sont sincère ou focu. L'équitation toute ma vie. Un animal, un amour. Des amies, une seconde famille. Un monde bien particulier; un univers parfait. Avant tout, l. Posté le s...
G. L. SHERIDAN - WRITER - HOME
NOVELS AND OTHER WORK. G L SHERIDAN - WRITER. Hello Lovely Person. Welcome to my website. My full name is Giacomina Laura Sheridan. I get some strange looks when people see my first name. It's rare that I hear it pronounced correctly. So I've always used my middle name - Laura. Easier. But I still like Giacomina. It sounds exotic. My parents were Italian - well, my Mum was. My Dad was from Sicily (like Inspector Montalbano). I was the editor of. Http:/ burnley-district-writers.weebly.com.
Blog de g-laure - ¤*°¤ vÖil@ mÖn sKy ¤°*¤ - Skyrock.com
Mot de passe :. J'ai oublié mon mot de passe. 164;* ¤ vÖil@ mÖn sKy ¤ *¤. T sUr mOn sKy et surtOut l@! Ns de cOm'$! D L' qu! ON eT c' $t ma pa$siOn . DE$ Ch v@uX de et d $ aN! Mise à jour :. Abonne-toi à mon blog! N'oublie pas que les propos injurieux, racistes, etc. sont interdits par les conditions générales d'utilisation de Skyrock et que tu peux être identifié par ton adresse internet (67.219.144.114) si quelqu'un porte plainte. Ou poster avec :. Posté le vendredi 23 mars 2007 17:32. Ou poster avec :.
Laurent Gaffié blog
This blog reflects my own opinions. Friday, March 31, 2017. MultiRelay 2.0: Runas, Pivot, SVC, and Mimikatz Love. If you haven't read the initial MultiRelay introduction post. I strongly invite you to read it. MultiRelay 2.0 is a powerful -professional grade- pentest utility included in Responder's tools folder, giving you the ability to perform targeted NTLMv1 and NTLMv2 relay and post exploitation on a selected target. Upload a file on the target:. Delete a file on the target:. Scan the current /24 or ...
g-lavie.com - g-lavie Resources and Information.
G-Law.com - This Name is Now Available to RENT or BUY !!!
Your browser does not support frames. We recommend upgrading your browser. To enter the site.
さくらのレンタルサーバ
レンタルサーバなら さくらのレンタルサーバ 月額換算でわずか129円、缶ジュース1本分のお値段で使える格安プランから、ビジネスにも使える多機能 大容量プランまで、 用途と予算に合わせてプランを選べます。
g-law.pro
Ce nom de domaine n'est pas disponible. Il a été enregistré via gandi.net. More information about the owner. Enregistrer votre nom de domaine. Chez Gandi, vous avez le choix sur plus d'une centaine d'extensions et vous bénéficiez de tous les services inclus (mail, redirection, ssl.). Rechercher un nom de domaine. Votre site dans le cloud? Découvrez Simple Hosting, notre cloud en mode PaaS à partir de 4 HT par mois (-50% la première année pour les clients domaine). It is currently being parked by the owner.
SOCIAL ENGAGEMENT