Recommend Example: Exploiting a typical Windows Domain network (Email)

This action will generate an email recommending this article to the recipient of your choice. Note that your email address and your recipient's email address are not logged by this system.

EmailEmail Article Link

The email sent will contain a link to this article, the article title, and an article excerpt (if available). For security reasons, your IP address will also be included in the sent email.

Article Excerpt:
If you ever wondered about the way someone can exploit a network, Brian Fine found a nice explanation of one method that can be used to gain access to your systems. It is interesting to note that it all starts by visiting a “Trusted Site” that contains the initial code to give the initial access to the remote user. The original source for this information came from the SANS security web site. This article is full of information about many Top Cyber Security Risks and if this is your cup of tea then it is a good read.


Article Link:
Your Name:
Your Email:
Recipient Email:
Message: