+1

PowerShell really didn't add anything here. In every case, psexec or winrm 
could be used instead.

-----Original Message-----
From: Ben Scott [mailto:mailvor...@gmail.com] 
Sent: Monday, April 8, 2013 7:17 PM
To: NT System Admin Issues
Subject: Re: POSH PtH - this is...

On Mon, Apr 8, 2013 at 7:06 PM, Kurt Buff <kurt.b...@gmail.com> wrote:
> Amusing? Alarming? Both?
> http://labofapenetrationtester.blogspot.in/2013/04/poshing-the-hashes.
> html

  Neither?

  It seem to boil down to, if you steal credentials, you gain access to what 
those credentials protect.  This should not be a surprise.
:-)

-- Ben

~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ 
<http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

Reply via email to