When attacking Windows, one of the initial goals of an attacker is simple:
A very interesting post. A few months ago I read about NTLM. I understood that it has quite a few vulnerabilities and is no longer used. But I didn't imagine that it could be so “easy” to exploit.
A very interesting post. A few months ago I read about NTLM. I understood that it has quite a few vulnerabilities and is no longer used. But I didn't imagine that it could be so “easy” to exploit.