If you missed the show from today (09/12/2016) or just want to review it again, we’ve got it edited and posted to our YouTube channel!
On this episode we go over the recent attack published by Mubix to snag credentials from a locked Windows system. This attack uses a usb to ethernet and responder to pick up credentials broadcasted out by a system in normally a matter of seconds, even when the user screen is locked.
Original post from Mubix:
https://room362.com/post/2016/snagging-creds-from-locked-machines/
USB Armory:
https://inversepath.com/usbarmory
Lan Turtle:
LAN Turtle
HashCat:
https://hashcat.net/hashcat/
https://hashcat.net/wiki/doku.php?id=frequently_asked_questions#why_should_i_use_a_mask_attack_i_just_want_to_brute_these_hashes
https://hashcat.net/wiki/doku.php?id=example_hashes
We’ll be back on the air tomorrow (09/13/2016) at 10am EST! Join us at http://www.foolishtechshow.com to join our live chat and talk with us directly!