+1 PowerShell really didn't add anything here. In every case, psexec or winrm could be used instead.
-----Original Message----- From: Ben Scott [mailto:mailvor...@gmail.com] Sent: Monday, April 8, 2013 7:17 PM To: NT System Admin Issues Subject: Re: POSH PtH - this is... On Mon, Apr 8, 2013 at 7:06 PM, Kurt Buff <kurt.b...@gmail.com> wrote: > Amusing? Alarming? Both? > http://labofapenetrationtester.blogspot.in/2013/04/poshing-the-hashes. > html Neither? It seem to boil down to, if you steal credentials, you gain access to what those credentials protect. This should not be a surprise. :-) -- Ben ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin