How to (temporarily) disable McAfee Endpoint Security on an enterprise workstation?

I need to temporarily disable McAfee Endpoint Security on an enterprise workstation after having obtained local administrative privileges. The McAfee Endpoint Security settings are protected by a password.

I’ve tried to stop… Continue reading How to (temporarily) disable McAfee Endpoint Security on an enterprise workstation?

Disabling RC4 HMAC encryption in Windows Active Directory prevents current Kerberos attacks?

Disabling RC4 HMAC encryption in Windows Active Directory prevents current Kerberos attacks?

I understand that RC4 HMAC encryption is dangerous in Windows Active Directory, since it relies on the user’s NT hash as the en… Continue reading Disabling RC4 HMAC encryption in Windows Active Directory prevents current Kerberos attacks?

How do VPN providers prevent getting blocked using e.g. Cloudflare, like it is the case for Tor exit-nodes?

How do VPN providers prevent getting blocked using e.g. Cloudflare, like it is the case for Tor exit-nodes?

Anyone using Tor to the browse the Internet have experienced that their connection is blocked by Cloudflare or s… Continue reading How do VPN providers prevent getting blocked using e.g. Cloudflare, like it is the case for Tor exit-nodes?

Why doesn’t DLL injection works on Windows 10 for native Windows binaries (e.g. calc.exe)?

Why doesn’t DLL injection works on Windows 10 for native Windows binaries (e.g. calc.exe)?

I’ve been playing around with DLL injection by reading some old articles to that use, e.g., calc.exe to inject into.

However, on… Continue reading Why doesn’t DLL injection works on Windows 10 for native Windows binaries (e.g. calc.exe)?

How do exploit developers counter control-flow integrity (CFI) used to prevent ROP-based buffer overflow attacks?

How do exploit developers counter control-flow integrity (CFI) used to prevent ROP-based buffer overflow attacks?

Originally, return-oriented programming (ROP) was invented to counter the no-execute (NX) protection of th… Continue reading How do exploit developers counter control-flow integrity (CFI) used to prevent ROP-based buffer overflow attacks?

Hydra fails with "[ERROR] target ssh://192.168.16.128:22/ does not support password authentication."?

I’ve updated Kali 2.0 to newest version – it is installed using VMWare.

Now, every time I use hydra to brute-force SSH, I get the following error:

[ERROR] target ssh://192.168.16.128:22/ does not support password authentica… Continue reading Hydra fails with "[ERROR] target ssh://192.168.16.128:22/ does not support password authentication."?