
George Noseevich
@webpentest
ID: 708774510
21-07-2012 10:35:21
708 Tweet
757 Followers
102 Following





Thanks Hackerdom, HITBSecConf , DisruptAD, Crowdfense, and all competitors for another great AD CTF!


Thing I learned today: Decrypting arbitrary TLS sessions on Windows (for code utilizing schannel): b.poc.fun/decrypting-sch… Great explanation, and very easy to use code, by George Noseevich

