Have you ever wondered how to describe a gazillion of objects in the operating system in order to set up permissions to them… or how to change these permissions in different types of objects… and what tools do you need to do it? Well, sit back and relax — because you’re about to get THE answers.
Read more
Why changing your cached credentials to 0 or 1 is… pointless? I will show you how cached logon data works, what is inside, how we’re able to overwrite it, and what kind of threat it exposes.
Read more
Local administrator’s passwords on servers and workstations are usually unmanaged or set up to be the same. In both cases, this is a mistake. In this tutorial you will learn how to manage centrally passwords and make sure that they are different on every computer in the enterprise. All for that if someone gets into one of the computers and steals local hashes, one is not capable to single-sign-on amongst other computers.
Read more