High-Power Hash Cracking with NPK
March, 2019, Brad Woodward, Director, Coalfire Labs
Password hashes are an everyday part of life in Coalfire Labs. Barring any other low-hanging fruit, it’s not uncommon for a penetration test to hinge on recovering a plaintext password from one of these hashes. Whether it’s NTLM hashes from Active Directory, NetNTLMv2 from Responder, WPA2 PMK from a wireless penetration test, or hundreds of other possible sources of hashes, recovering the original password has been a challenge for hackers for decades.
Enabling Clients to Cope with ASV Scans
February, 2019, Marco Brown, Associate, CoalfireOne Scanning Services
Gathering evidence, applying patches, and configuring your systems in preparation for submitting your vulnerability disputes can be a nerve-wracking and daunting task. To better enhance your understanding of the Approved Scanning Vendor (ASV) process, I’ve outlined some coping mechanisms and tools to use.
Compensating Controls: When Patching Isn’t an Option
February, 2019, Steve Durham, Consultant, CoalfireOne Scanning Services
Your software vendor is asleep at the wheel and your devs still need that legacy daemon.
The HOW, WHY, and HUH? Blog on Disputes
January, 2019, Travis Finn, Consultant, CoalfireOne Scanning Services
As you may know, performing vulnerability scans is a requirement for PCI DSS compliance. One of those specific requirements, described in section 11.2.2, states that quarterly external scanning must be done by a qualified Approved Scanning Vendor. Coalfire just so happens to be an ASV, so if you need these scans we would happily oblige!
Epic Holiday Cookie Baking
December, 2018, Jim Allee, Senior Consultant, Coalfire