References

  1. L. Heddings, Using PsTools to Control Other PCs from the Command Line, Howtogeek.com, 2017. [Online]. Available: https://www.howtogeek.com/school/sysinternals-pro/lesson8/all/. [Accessed: 13- Aug- 2017].
  2. C. Sanders, PsExec and the Nasty Things It Can Do - TechGenix, Techgenix.com, 2017. [Online]. Available: http://techgenix.com/psexec-nasty-things-it-can-do/. [Accessed: 13- Aug- 2017].
  3. D. FitzGerald, The Hackers Inside Your Security Cam, Wall Street Journal, 2017. Available: https://search.proquest.com/docview/1879002052?accountid=45049.
  4. S. Metcalf, Hacking with PowerShell - Active Directory Security, Adsecurity.org, 2017. [Online]. Available: https://adsecurity.org/?p=208. [Accessed: 13- Aug- 2017].
  5. A. Hesseldahl, Details Emerge on Malware Used in Sony Hacking Attack, Recode, 2017. [Online]. Available: https://www.recode.net/2014/12/2/11633426/details-emerge-on-malware-used-in-sony-hacking-attack. [Accessed: 13- Aug- 2017].
  6. Fun with Incognito - Metasploit Unleashed, Offensive-security.com, 2017. [Online]. Available: https://www.offensive-security.com/metasploit-unleashed/fun-incognito/. [Accessed: 13- Aug- 2017].
  7. A. Hasayen, Pass-the-Hash attack, Ammar Hasayen, 2017. [Online]. Available: https://ammarhasayen.com/2014/06/04/pass-the-hash-attack-compromise-whole-corporate-networks/. [Accessed: 13- Aug- 2017].
  1. S. Metcalf, Hacking with PowerShell - Active Directory Security, Adsecurity.org, 2018. [Online]. Available: https://adsecurity.org/?p=208. [Accessed: 01- Jan- 2018].
  2. Microsoft Security Bulletin MS14-068 - Critical, Docs.microsoft.com, 2018. [Online]. Available: https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-068. [Accessed: 01- Jan- 2018].
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.116.59.72