Patrick Laverty 🎱 Profile picture
Organizer https://t.co/koddp3Iu9y, Host #Layer8Podcast, trust but verify.
Mar 8, 2021 73 tweets 14 min read
Based on the incredible work by @TinkerSec, I thought I’d also try to do a *live tweet of a company’s internal network pentest.
*Not actually live. From some time ago. I wanted to share this with you as it is pretty typical and I think people like seeing what pentesting “is really like”.
We start out with scope.
Oct 16, 2020 15 tweets 3 min read
Starting a thread here. Sure, some people know this stuff, but maybe I'll reach one person who doesn't and is interested.
Want to try password cracking? Cool. Either install hashcat or a VM that has it, like Kali Linux. Get yourself some hashes, the haveibeenpwned.com site has some. Figure out what kind they are, like md5, ntlm or and find the correct "m code" here: hashcat.net/wiki/doku.php?… Personally, I like to work on NTLM hashes, which use the code 1000.