Drew yeskatalas

64 Flips | 4 Magazines | 12 Likes | 2 Followers | @Drewyeskatalas | Keep up with Drew yeskatalas on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “Drew yeskatalas”

The Sexiest Cinematic Threesomes

If you're a fan of the triple kiss, these TV shows and movies are for you.<p>Photos: Getty Images, Everett Collection, MGM ; Illustration: Dillen</i> …

Monitoring Active Directory for Signs of Compromise

24 minutes to read<p>Contributors<p>Applies To: Windows Server 2016, Windows Server 2012 R2, Windows Server 2012<p><i>Law Number Five: Eternal vigilance is the</i> …

Windows Elevated Programs with Mapped Network Drives

This post is about a lesson that seems to be one that just won’t sink into my own head. I run into the issue time and time again, but I can’t seem to …

Tools Updates : a Collection security and hacking tools; likes exploits, proof of concepts, shellcodes, scripts, and more.

<b>Changelog v9/10/2016:</b><br>+ Scanner: Automated HTTP Enumeration v0.4 *New<br>+ Exploit: add freepbx exploit<br>+ Misc: Breakout Atari 2600 Homebrew (PAL …

Guy bitten on penis by venomous spider gets bitten on penis by venomous spider again

This guy thinks he’s the unluckiest person in Australia. We think he’s the unluckiest person on the planet.<p>Jordan, 21, doesn’t want to give his full …

Zoology

How to Search the Deep Web

Search engines such as Google index well over a trillion pages on the World Wide Web[1], but there is information on the web that common search …

Hack This: Become a Command Line Assassin

One of your operating system's most powerful tools is more accessible than you think.<p>No matter what kind of cluttered, icon-littered hellscape your filesystem happens to be, take heart that your computer provides a pristine alternate reality in the form of its command line interface. Essentially, …

Ohio Man Arrested for Allegedly Having Sex With a Van

Guess which part of the van.<p>A 35-year-old man has been charged with two counts of public indecency after he exposed himself and then tried to have sex with a parked van in Dayton, Ohio.<p>Dayton police were called to the scene of the van crime around 8 p.m. Tuesday, when someone reported that a man …

How to Train to Be Unstoppable

High-Intensity Continuous Training<p>High Intensity Continuous Training<p>HICT is a way for everyone from special ops guys and adventure athletes to …

The Workout to Get Big—But Stay Shredded

Guys oftentimes think they must choose: Get big or get shredded. But, with the new <b>21-Day Bulk</b> program, you can have the best of both worlds. Check …

Fitness

Confuse and Amuse Your Adventuring Party with Out of Context D&D Quotes

Role-playing games are all about creativity, compromise, and carefully avoiding becoming a murder hobo. When we sit down to our tables, dice out, …

How CERN Fights Hackers

Computer Security Officer Stefan Lueders explains how CERN keeps a vast number of servers, computers, and systems secure from constant attack.<p>Security is all about balance—keeping users and data safe has to sit alongside usability and efficiency. At CERN, the European Organization for Nuclear …

F-Secure provides more details on the Petya ransomware

Several days ago, I wrote about a new singular Ransomware dubbed Petya that captured the attention of security experts because it causes a blue …

Pentestly - Python and Powershell internal Penetration Testing Framework

Pentestly is a combination of expanding Python tools for use in penetration tests. The goal is to utilize a familiar user interface while making …

Top 7 Dumbbells Only Exercises for Big Shoulders

If a pair of dumbbells is all you have, it’s good enough to get done an intense workout for your shoulders. You can hit the muscles hard enough and …

14 Unexpected Moves That Work Your Abs Better Than Crunches

When it comes to bodyweight abs exercises, crunches aren't always the way to go. In fact, research has shown the classic crunch isn't even that …

Workouts

HOW IT WORKS

Can’t seem to shed your spare tire? This workout and diet program strips away excuses so you can strip away belly fat<p>Can’t seem to ever shed your spare tire? The Fast and Lean program strips away excuses so you can strip away fat.<p>It’s not a one-size-fits-all workout and diet plan. Quite the …

Exercise

When 'Free' Windows 10 Becomes Expensive, You Should Fear This

Here is a date which should worry you: July 29th 2016. This is the date Microsoft will start charging for Windows 10. Here is another date which should worry you more: July 17th, 2017. Why? Because it just made July 29th, 2016 one heck of a lot worse…<p>July 17th, 2017 is at the heart of perhaps …

Mimikatz – Active Directory Security

<b>Unofficial Guide to Mimikatz & Command Reference</b><p>Mimikatz Command Reference Version: mimikatz 2.1.1 (x64) built on Nov 28 2017 <i><br>Page last updated:</i> …

Def Con 23 - Sean Metcalfe - Red Vs Blue: Modern Active Directory Attacks And Defense

<b>Description:</b> Kerberos “Golden Tickets” were unveiled by Alva “Skip” Duckwall & Benjamin Delpy in 2014 during their Black Hat USA presentation. Around …

Finding Passwords in SYSVOL & Exploiting Group Policy Preferences – Active Directory Security

At Black Hat and DEF CON this year, I spoke about ways attackers go from Domain User to Domain Admin in modern enterprises.<p>Every Windows computer has …

How Attackers Dump Active Directory Database Credentials – Active Directory Security

I previously posted some information on dumping AD database credentials before in a couple of posts: “How Attackers Pull the Active Directory …

Attack Methods for Gaining Domain Admin Rights in Active Directory – Active Directory Security

There are many ways an attacker can gain Domain Admin rights in Active Directory. This post is meant to describe some of the more popular ones in …

Exchange Analyzer v0.1.0-Beta.1 Released

I’m pleased to announce the first beta release of Exchange Analyzer.Exchange Analyzer is a PowerShell tool that scans an Exchange Server 2013/2016 …

CrackMapExec v-2.3 Codename: ‘Pink Bubbles’ – A swiss army knife for pentesting Windows/Active Directory environments. – Security List Network™

<b>Changelog v-2.3 Codename: ‘Pink Bubbles’</b>:<p>+ Added MSSQL support<br>+ Added flags to enumerate MSSQL DB instances<br>+ Added flags to enable/disable …

Maltrail – Malicious traffic detection system

Maltrail is an open source project that help to investigate and detect malicious traffic. The tool uses several popular feeds to blacklist or …

How To Go From 0 to Sniffing Packets in 10 Minutes

Meet Wireshark.<p>Right around the time I was learning the fine art of packet sniffing in an intro to computer networks class, my home internet network started going completely to hell. Sometimes it was fine, but, increasingly, it was slowing to a sub-dial-up trickle of around 20 Kbps. Given that I …

Even the best antivirus likely can't save your files from a ransomware infection

One of the most prevalent forms of malware out there right now is called ransomware, a virus that encrypts a user's files, leaving them scrambled unless the victim pays for the decryption key.<p>It's a criminal business model that has proven extremely profitable. Some of the largest actors may be …

15 Confessions From People Who Literally Think That Sex Is The Best Workout

"I like to be on top during sex because I feel like I'm working out my legs and butt." All confessions courtesy of Whisper.

A Flaw on eBay’s Site Allowed Hackers To Steal User’s Passwords

A security researcher found a flaw in eBay’s main domain that potentially allowed hackers to harvest credentials.<p>A critical bug on eBay's website opened the door for malicious hackers to create fake login pages to steal passwords and harvest credentials.<p>An independent security researcher found the …