Reserch
Black Hat Japan 2004
Optimized Attack for NTLM2 Session Response
< pdf file >
Black Hat Windows Security 2004 Briefings
Fingerprinting through Windows RPC
< pdf file >
Black Hat Windows Security 2003 Briefings
Exploiting DCOM
< ppt file >
Black Hat Windows Security 2002 Briefings
Cracking NTLMv2 Authentication
< ppt file >
Black Hat USA 2001 Briefings
Promiscuous node detection using ARP packets
< ppt file >