logo
  • About
  • Contact
  • Instant Response
  • Hall of fame
  • COVID-19

Categories

  • Alerts and warnings
  • BU Safe
  • Hit by ransomware?
  • Incident handling
  • News

Noticed a problem?

Report an Incident
–or–

Recent Posts

  • ASEC Weekly Malware Statistics (January 30th, 2023 – February 5th, 2023)
  • Major CrackDown – Police Hacked Exclu ‘secure’ Cybercriminal Message Platform
  • Vulnerability Provided Access to Toyota Supplier Management Network
  • OpenSSL fixes High Severity data-stealing bug – patch now!
  • PixPirate – Advanced Android Threat Targets Brazilian Financial Organizations

Video

https://www.youtube.com/watch?v=wMsHDH67eb4

RSS NVD Data Feed

  • CVE-2022-46842 (js_help_desk) 2 February 2023
  • CVE-2022-46815 (conditional_shipping_for_woocommerce) 2 February 2023
  • CVE-2022-45807 (wp_mail_log) 2 February 2023
  • CVE-2022-45782 (dotcms) 1 February 2023
  • CVE-2022-46934 (kkfileview) 1 February 2023

RSS CERT-EU News Feed

Information

  • Privacy & Cookies Policy

SharpSecDump – .Net Port Of The Remote SAM + LSA Secrets Dumping Functionality Of Impacket’S Secretsdump.Py

Posted on 27 September 2020

From kitploit.com

.Net port of the remote SAM + LSA Secrets dumping functionality of impacket’s secretsdump.py. By default runs in the context of the current user. Please only use in environments you own or have permission to test against .

Read more…

Posted in News

Post navigation

Previous post: Business – COVID-19: Storage in the cloud VS data centers!
Next post: ThunderX ransomware silenced with release of a free decryptor
BU CERT
Authorized to use CERT(TM) - CERT is a mark owned by Carnegie
Mellon University

Other CERTs

  • National Cyber Security Centre
  • US-CERT
  • FORTHcert
Proudly powered by WordPress | Theme: bu-cert by Nan Jiang.