<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
		>
<channel>
	<title>Comments for Explore Security</title>
	<atom:link href="https://www.exploresecurity.com/comments/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.exploresecurity.com</link>
	<description>IT security tools, techniques and commentary</description>
	<lastBuildDate>Sun, 07 Sep 2025 03:12:25 +0000</lastBuildDate>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.6.1</generator>
	<item>
		<title>Comment on The Small Print for OpenSSL legacy_renegotiation by Desain</title>
		<link>https://www.exploresecurity.com/the-small-print-for-openssl-legacy_renegotiation/#comment-91391</link>
		<dc:creator>Desain</dc:creator>
		<pubDate>Sun, 07 Sep 2025 03:12:25 +0000</pubDate>
		<guid isPermaLink="false">http://www.exploresecurity.com/?p=245#comment-91391</guid>
		<description><![CDATA[How do you balance the trade-off between backward compatibility (supporting old servers) and strict security enforcement when dealing with SSL/TLS legacy options?]]></description>
		<content:encoded><![CDATA[<p>How do you balance the trade-off between backward compatibility (supporting old servers) and strict security enforcement when dealing with SSL/TLS legacy options?</p>
]]></content:encoded>
	</item>
	<item>
		<title>Comment on Testing for Cipher Suite Preference by Jerome</title>
		<link>https://www.exploresecurity.com/testing-for-cipher-suite-preference/#comment-91385</link>
		<dc:creator>Jerome</dc:creator>
		<pubDate>Mon, 01 Sep 2025 08:46:18 +0000</pubDate>
		<guid isPermaLink="false">http://www.exploresecurity.com/?p=296#comment-91385</guid>
		<description><![CDATA[Clearly manual testing is much slower. That&#039;s why a tool is useful. Manual testing is used to provide definitive evidence of a particular result from an automated tool. For certain types of vulnerability, however, it&#039;s not possible to test using something like OpenSSL out-of-the-box because obviously it is not designed to send malformed packets. As you can tell from the date of this post (and other posts in the same category) it&#039;s been some time since I last looked at this area. The tools mentioned in this post may not be best-in-class. In general, for any tool you are relying on, it&#039;s useful to read the docs so you know what its capabilities and limitations are, and then try it out against known targets i.e. a server you&#039;ve configured. Additionally, as in this post, running two tools to ensure there is agreement is a good way to try to eliminate errors. Any discrepancy can be followed up with manual testing. Hope that&#039;s useful.]]></description>
		<content:encoded><![CDATA[<p>Clearly manual testing is much slower. That&#8217;s why a tool is useful. Manual testing is used to provide definitive evidence of a particular result from an automated tool. For certain types of vulnerability, however, it&#8217;s not possible to test using something like OpenSSL out-of-the-box because obviously it is not designed to send malformed packets. As you can tell from the date of this post (and other posts in the same category) it&#8217;s been some time since I last looked at this area. The tools mentioned in this post may not be best-in-class. In general, for any tool you are relying on, it&#8217;s useful to read the docs so you know what its capabilities and limitations are, and then try it out against known targets i.e. a server you&#8217;ve configured. Additionally, as in this post, running two tools to ensure there is agreement is a good way to try to eliminate errors. Any discrepancy can be followed up with manual testing. Hope that&#8217;s useful.</p>
]]></content:encoded>
	</item>
	<item>
		<title>Comment on Testing for Cipher Suite Preference by Desain</title>
		<link>https://www.exploresecurity.com/testing-for-cipher-suite-preference/#comment-91370</link>
		<dc:creator>Desain</dc:creator>
		<pubDate>Thu, 21 Aug 2025 12:40:55 +0000</pubDate>
		<guid isPermaLink="false">http://www.exploresecurity.com/?p=296#comment-91370</guid>
		<description><![CDATA[How thorough is this manual testing method compared to automated tools like ssl-enum-ciphers in Nmap?]]></description>
		<content:encoded><![CDATA[<p>How thorough is this manual testing method compared to automated tools like ssl-enum-ciphers in Nmap?</p>
]]></content:encoded>
	</item>
	<item>
		<title>Comment on From CSV to CMD to qwerty by How feasible is it for an attacker to brute-force an NTLMv2 response captured off the network?</title>
		<link>https://www.exploresecurity.com/from-csv-to-cmd-to-qwerty/#comment-70841</link>
		<dc:creator>How feasible is it for an attacker to brute-force an NTLMv2 response captured off the network?</dc:creator>
		<pubDate>Wed, 20 Apr 2022 05:38:11 +0000</pubDate>
		<guid isPermaLink="false">http://www.exploresecurity.com/?p=415#comment-70841</guid>
		<description><![CDATA[[&#8230;] it to using the Praetorian or root9b techniques), then you want to check out this blog post &#8212; http://www.exploresecurity.com/from-csv-to-cmd-to-qwerty/ &#8212; as the author explains which parts of the NET-NTLMv2 request and response need to be [&#8230;]]]></description>
		<content:encoded><![CDATA[<p>[&#8230;] it to using the Praetorian or root9b techniques), then you want to check out this blog post &#8212; <a href="http://www.exploresecurity.com/from-csv-to-cmd-to-qwerty/" rel="nofollow">http://www.exploresecurity.com/from-csv-to-cmd-to-qwerty/</a> &#8212; as the author explains which parts of the NET-NTLMv2 request and response need to be [&#8230;]</p>
]]></content:encoded>
	</item>
	<item>
		<title>Comment on SQL Injection in Search Fields by Jerome</title>
		<link>https://www.exploresecurity.com/sql-injection-in-search-fields/#comment-67617</link>
		<dc:creator>Jerome</dc:creator>
		<pubDate>Tue, 03 Mar 2020 23:02:12 +0000</pubDate>
		<guid isPermaLink="false">http://www.exploresecurity.com/?p=234#comment-67617</guid>
		<description><![CDATA[Sorry, but I wrote this article over 5 years ago so I can&#039;t remember anything more about this particular case. In general, what I&#039;d recommend is first focusing on getting a simple proof-of-concept working using manual injection. This will ensure you understand the nature of the query in which the injection point resides e.g. in the above case I had to cater for nested queries by adding &lt;code&gt;))&lt;/code&gt;. Ideally, only once you&#039;re getting reliable results from manual techniques is it worth throwing an automated tool like &lt;em&gt;sqlmap&lt;/em&gt; at the problem. In this way, if the tool fails, you know either it&#039;s your configuration of the tool or the tool itself. Without proving the case manually, another reason for the tool failing is that there isn&#039;t a vulnerability there at all!]]></description>
		<content:encoded><![CDATA[<p>Sorry, but I wrote this article over 5 years ago so I can&#8217;t remember anything more about this particular case. In general, what I&#8217;d recommend is first focusing on getting a simple proof-of-concept working using manual injection. This will ensure you understand the nature of the query in which the injection point resides e.g. in the above case I had to cater for nested queries by adding <code>))</code>. Ideally, only once you&#8217;re getting reliable results from manual techniques is it worth throwing an automated tool like <em>sqlmap</em> at the problem. In this way, if the tool fails, you know either it&#8217;s your configuration of the tool or the tool itself. Without proving the case manually, another reason for the tool failing is that there isn&#8217;t a vulnerability there at all!</p>
]]></content:encoded>
	</item>
	<item>
		<title>Comment on SQL Injection in Search Fields by zonduu</title>
		<link>https://www.exploresecurity.com/sql-injection-in-search-fields/#comment-67607</link>
		<dc:creator>zonduu</dc:creator>
		<pubDate>Mon, 02 Mar 2020 03:09:17 +0000</pubDate>
		<guid isPermaLink="false">http://www.exploresecurity.com/?p=234#comment-67607</guid>
		<description><![CDATA[I have the same exact behavior in one website i am testing, but when trying it with sqmal using “space2comment” i had no luck. Could you please tell me how was the payload used by sqlmap that worked? I want to try a sleep command or anything that really confirms this issue! Please!!!]]></description>
		<content:encoded><![CDATA[<p>I have the same exact behavior in one website i am testing, but when trying it with sqmal using “space2comment” i had no luck. Could you please tell me how was the payload used by sqlmap that worked? I want to try a sleep command or anything that really confirms this issue! Please!!!</p>
]]></content:encoded>
	</item>
	<item>
		<title>Comment on William &#8211; WPA/WPA2 4-way handshake extraction script by blake</title>
		<link>https://www.exploresecurity.com/william-wpawpa2-4-way-handshake-extraction-script/#comment-60252</link>
		<dc:creator>blake</dc:creator>
		<pubDate>Wed, 31 Jul 2019 17:20:09 +0000</pubDate>
		<guid isPermaLink="false">http://www.exploresecurity.com/?p=14#comment-60252</guid>
		<description><![CDATA[god, thank you so much.  I don&#039;t know why, but validating that packets contain EAPOL data has been soooo painful.]]></description>
		<content:encoded><![CDATA[<p>god, thank you so much.  I don&#8217;t know why, but validating that packets contain EAPOL data has been soooo painful.</p>
]]></content:encoded>
	</item>
	<item>
		<title>Comment on SSL/TLS Checklist for Pentesters by Jerome</title>
		<link>https://www.exploresecurity.com/ssltls-checklist-for-pentesters/#comment-57873</link>
		<dc:creator>Jerome</dc:creator>
		<pubDate>Fri, 17 May 2019 15:22:15 +0000</pubDate>
		<guid isPermaLink="false">http://www.exploresecurity.com/?p=201#comment-57873</guid>
		<description><![CDATA[Thanks, Phil. The first was working - you just had to scroll down to find the presentation, but I&#039;ve now updated it with a direct link. The second was broken, and that&#039;s now updated. Things have moved on a bit since then but hopefully there&#039;s some core material you&#039;ll find useful.]]></description>
		<content:encoded><![CDATA[<p>Thanks, Phil. The first was working &#8211; you just had to scroll down to find the presentation, but I&#8217;ve now updated it with a direct link. The second was broken, and that&#8217;s now updated. Things have moved on a bit since then but hopefully there&#8217;s some core material you&#8217;ll find useful.</p>
]]></content:encoded>
	</item>
	<item>
		<title>Comment on SSL/TLS Checklist for Pentesters by Phil Gillis</title>
		<link>https://www.exploresecurity.com/ssltls-checklist-for-pentesters/#comment-57595</link>
		<dc:creator>Phil Gillis</dc:creator>
		<pubDate>Fri, 10 May 2019 17:43:34 +0000</pubDate>
		<guid isPermaLink="false">http://www.exploresecurity.com/?p=201#comment-57595</guid>
		<description><![CDATA[The links to your slides from http://www.exploresecurity.com/ssltls-checklist-for-pentesters/  are not working.  Topic sounds interesting.  Are they available anywhere?

Thanks!

Phil]]></description>
		<content:encoded><![CDATA[<p>The links to your slides from <a href="http://www.exploresecurity.com/ssltls-checklist-for-pentesters/" rel="nofollow">http://www.exploresecurity.com/ssltls-checklist-for-pentesters/</a>  are not working.  Topic sounds interesting.  Are they available anywhere?</p>
<p>Thanks!</p>
<p>Phil</p>
]]></content:encoded>
	</item>
	<item>
		<title>Comment on From CSV to CMD to qwerty by Jerome</title>
		<link>https://www.exploresecurity.com/from-csv-to-cmd-to-qwerty/#comment-41587</link>
		<dc:creator>Jerome</dc:creator>
		<pubDate>Fri, 25 Jan 2019 10:05:21 +0000</pubDate>
		<guid isPermaLink="false">http://www.exploresecurity.com/?p=415#comment-41587</guid>
		<description><![CDATA[Nice to get a mention :-)]]></description>
		<content:encoded><![CDATA[<p>Nice to get a mention <img src='https://www.exploresecurity.com/wp-includes/images/smilies/icon_smile.gif' alt=':-)' class='wp-smiley' /> </p>
]]></content:encoded>
	</item>
</channel>
</rss>
