Nathan Sweaney

Defending Against Pass-the-Hash (PtH) Attacks

Pass-the-Hash (PtH) attacks have become probably the most common form of credential attacks used in the hacking community. Especially in  Microsoft Windows environments, PtH tools are so popular and easy to use, that many attackers no longer even bother to crack passwords anymore. Why waste the time when an administrator’s hash is just as convenient, …

Defending Against Pass-the-Hash (PtH) Attacks Read More »

Kismet Log Viewer v2 Tool Released

Secure Ideas actively supports open source and giving back to the community. In that light, we’re announcing the release of an updated tool for parsing and viewing Kismet log files. Kismet is a fantastic tool for wireless network assessments. It passively detects networks, SSIDs, and with enough time can even decloak hidden networks by capturing …

Kismet Log Viewer v2 Tool Released Read More »

Getting Started with BeEF: The Browser Exploitation Framework

This post is the first in a series on Getting Started with information security tools. For more posts in this series, check out the Getting Started label on this post.  BeEF, the Browser Exploitation Framework, is a testing tool designed to enable penetration testers to launch client-side attacks against target browsers. By using techniques similar …

Getting Started with BeEF: The Browser Exploitation Framework Read More »

Scroll to Top