Detecting Kerberoasting

Detecting Kerberoasting

By Tim Medin | October 21, 2020

Kerberoasting is an effective method for privilege escalation, pivoting, and even persistence. Let’s take a look at ways to detect (and prevent) this attack. Jump to the portion of this […]

Learn More
Detecting Kerberoasting

On Purple

By Tim Medin | July 12, 2019

The “Purple Team” term has been flying around for a while now and it is an important development in our growth as an industry. If you haven’t heard the term […]

Learn More
On Purple

Logging Passwords on Linux

By Tim Medin | May 30, 2019

Hal Pomeranz tipped me off to a nasty little trick of using Linux’s own auditing features and PAM to grab clear text passwords from users as they use sudo/su on […]

Learn More
Logging Passwords on Linux

Germany Says Auf Wiedersehen to Hi-Tech Doll

By Tim Medin | March 28, 2018

The German government has banned a hi-tech doll that has given U.S. privacy groups and Red Siege founder, Tim Medin, concerns for years. The My Friend Cayla doll, which remains […]

Learn More
Germany Says Auf Wiedersehen to Hi-Tech Doll

Beyond Net User – Part 2: DS Commands

By Tim Medin | February 6, 2018

In the previous post we discussed some of the limitations of Net commands. Most notably, the output limitation (doesn’t show all groups) and it doesn’t allow for flexible searching. In […]

Learn More
Beyond Net User – Part 2: DS Commands

Beyond Net User – Part 1: Limitations of the “Net” commands

By Tim Medin | January 30, 2018

I’ve had a number of cases where the Windows “net user”, “net group”, and “net localgroup” have failed me. I’ve had SQLMap fail to give the last line of “net […]

Learn More
Beyond Net User – Part 1: Limitations of the “Net” commands

Better FDE Passphrase with macOS FileVault

By Tim Medin | January 26, 2018

I use full disk encryption (FDE) on all my laptops and portable media. I like to have a very strong passphrase for these, one that is even stronger than that […]

Learn More
Better FDE Passphrase with macOS FileVault

3 Years of DirecTV User-Agent Command Injection

By Tim Medin | December 26, 2017

I found a bug in one of my DirecTV devices in 2015 after I got DirecTV. DirecTV didn’t have a bug bounty program at that time so I used it […]

Learn More
3 Years of DirecTV User-Agent Command Injection

Doll Hacking: The Good, The Bad(words) and the Ugly (features)

By Tim Medin | November 18, 2015

The age of internet connected toys is upon us. Increasingly, we are seeing children’s toys connected to the internet, commonly through an app. I recently purchased a My Friend Cayla […]

Learn More
Doll Hacking: The Good, The Bad(words) and the Ugly (features)