logo
  • About
  • Contact
  • Instant Response
  • Hall of fame
  • COVID-19

Categories

  • Alerts and warnings
  • BU Safe
  • Hit by ransomware?
  • Incident handling
  • News

Noticed a problem?

Report an Incident
–or–

Recent Posts

  • The Shifting Landscape of Open Source Supply Chain Attacks – Part 3
  • Chinese PlugX Malware Hidden in Your USB Devices?
  • Ukraine’s Critical Sectors Targeted in Phishing Attack Surge
  • 3 business application security risks businesses need to prepare for in 2023
  • Google slays thousands of fake news vids posted by pro-China group Dragonbridge

Video

https://www.youtube.com/watch?v=wMsHDH67eb4

RSS NVD Data Feed

  • CVE-2022-42387 (pdf-xchange_editor) 26 January 2023
  • CVE-2022-42389 (pdf-xchange_editor) 26 January 2023
  • CVE-2022-42388 (pdf-xchange_editor) 26 January 2023
  • CVE-2022-42390 (pdf-xchange_editor) 26 January 2023
  • CVE-2022-42386 (pdf-xchange_editor) 26 January 2023

RSS CERT-EU News Feed

Information

  • Privacy & Cookies Policy

Spraykatz – retrieve credentials on Windows machines

Posted on 12 April 2020

From hakin9.org

Spraykatz is a tool without any pretention able to retrieve credentials on Windows machines and large Active Directory environments.

It simply tries to procdump machines and parse dumps remotely in order to avoid detections by antivirus softwares as much as possible.

Read more…

Posted in News

Post navigation

Previous post: Sodinokibi Ransomware to stop taking Bitcoin to hide money trail
Next post: Microsoft April 2020 Patch Tuesday comes with fixes for four zero-days
BU CERT
Authorized to use CERT(TM) - CERT is a mark owned by Carnegie
Mellon University

Other CERTs

  • National Cyber Security Centre
  • US-CERT
  • FORTHcert
Proudly powered by WordPress | Theme: bu-cert by Nan Jiang.