This was originally written as the basis for a GIAC Gold paper. Ultimately, it was not unique enough to warrant a research paper, but will provide an overview of the security features of MacOS. As of mid 2016, MacOS captures nearly 10% of the global market for desktop PC software. While Apple computers…
Categories
 n00py Blog- Identifying New Attack Paths via Password Analysis
 - The SOCKS We Have at Home
 - Bypassing Amazon Kids+ Parental Controls
 - Bypassing Okta MFA Credential Provider for Windows
 - CactusCon 2023: BloodHound Unleashed
 - Exploiting Resource Based Constrained Delegation (RBCD) with Pure Metasploit
 - Practical Attacks against NTLMv1
 - Password Spraying RapidIdentity Logon Portal
 - Manipulating User Passwords Without Mimikatz
 - Unauthenticated Dumping of Usernames via Cisco Unified Call Manager (CUCM)
 
Archives
- April 2025
 - January 2024
 - April 2023
 - February 2023
 - January 2023
 - October 2022
 - March 2022
 - January 2022
 - September 2021
 - May 2021
 - December 2020
 - August 2020
 - May 2020
 - February 2020
 - January 2020
 - December 2019
 - June 2019
 - March 2019
 - October 2018
 - August 2018
 - June 2018
 - April 2018
 - March 2018
 - January 2018
 - December 2017
 - November 2017
 - October 2017
 - September 2017
 - August 2017
 - June 2017
 - April 2017
 - March 2017
 - January 2017
 - October 2016