all InfoSec news
Steal-It Campaign - In this campaign, the threat actors steal and exfiltrate NTLMv2 hashes using customized versions of Nishang's Start-CaptureServer PowerShell script, executing various system commands, and exfiltrating the retrieved data via Mockbi
Sept. 12, 2023, 9:39 a.m. | /u/digicat
For [Blue|Purple] Teams in Cyber Defence www.reddit.com
blueteamsec campaign data hashes ntlmv2 powershell powershell script script start steal system threat threat actors
More from www.reddit.com / For [Blue|Purple] Teams in Cyber Defence
Jobs in InfoSec / Cybersecurity
Red Team Penetration Tester and Operator, Junior
@ Booz Allen Hamilton | USA, VA, McLean (1500 Tysons McLean Dr)
Director, Security Operations & Risk Management
@ Live Nation Entertainment | Toronto, ON
IT and Security Specialist APAC (F/M/D)
@ Flowdesk | Singapore, Singapore, Singapore
Senior Security Controls Assessor
@ Capgemini | Washington, DC, District of Columbia, United States; McLean, Virginia, United States
GRC Systems Solution Architect
@ Deloitte | Midrand, South Africa
Cybersecurity Subject Matter Expert (SME)
@ SMS Data Products Group, Inc. | Fort Belvoir, VA, United States