1. Microsoft SQL Server Downgrade Attack

    I took a look at the authentication mechanisms of the native network protocols of some of the more prominent dbms vendors. One of my targets was Microsofts SQL Server 2008 R2. MSSQL provides two methods for authentication: Integrated and Native Authentication. Integrated uses Windows OS user credentials to log into ...

  2. TCP Proxy for MITM Attacks in Metasploit

    Some time ago I wrote my first metasploit module and therefore had to play around with ruby. The metasploit module I wrote implements a man-in-the-middle attack on an application layer protocol. So my module is both TCP Server and Client and therefore I like to call it TCP Proxy.

    Coming ...

    Tagged as : metasploit ruby mitm

Page 1 / 1