From c8d19ad39da921b281625dbf48310a939e04c9fd Mon Sep 17 00:00:00 2001 From: pe3zx Date: Thu, 29 Mar 2018 23:45:01 +0700 Subject: [PATCH] [Articles][Post Exploitation] Post Exploitation Using NetNTLM Downgrade Attacks --- README.md | 1 + 1 file changed, 1 insertion(+) diff --git a/README.md b/README.md index adb1d8e..ddd06ac 100644 --- a/README.md +++ b/README.md @@ -440,6 +440,7 @@ My curated list of awesome links, resources and tools #### Windows Post Exploitation +- [Post Exploitation Using NetNTLM Downgrade Attacks](https://www.optiv.com/blog/post-exploitation-using-netntlm-downgrade-attacks) - [Top Five Ways I Got Domain Admin on Your Internal Network before Lunch (2018 Edition)](https://medium.com/@adam.toscher/top-five-ways-i-got-domain-admin-on-your-internal-network-before-lunch-2018-edition-82259ab73aaa) ### Reverse Engineering