+1 PowerShell really didn't add anything here. In every case, psexec or winrm could be used instead.
-----Original Message----- From: Ben Scott [mailto:[email protected]] Sent: Monday, April 8, 2013 7:17 PM To: NT System Admin Issues Subject: Re: POSH PtH - this is... On Mon, Apr 8, 2013 at 7:06 PM, Kurt Buff <[email protected]> wrote: > Amusing? Alarming? Both? > http://labofapenetrationtester.blogspot.in/2013/04/poshing-the-hashes. > html Neither? It seem to boil down to, if you steal credentials, you gain access to what those credentials protect. This should not be a surprise. :-) -- Ben ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to [email protected] with the body: unsubscribe ntsysadmin ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to [email protected] with the body: unsubscribe ntsysadmin
