xvi
◾
Contents
References .......................................................................................................................253
Cracking the Hashes .......................................................................................................253
Bruteforce ..............................................................................................................253
Dictionary Attacks ............................................................................................... 254
Password Salts ....................................................................................................... 254
Rainbow Tables .................................................................................................... 254
John the Ripper ..............................................................................................................255
Cracking LM/NTLM Passwords with JTR ...........................................................255
Cracking Linux Passwords with JTR .....................................................................256
Rainbow Crack ...............................................................................................................256
Sorting the Tables ..................................................................................................257
Cracking the Hashes with rcrack ...........................................................................258
Speeding Up the Cracking Process ........................................................................258
Gaining Access to Remote Services .......................................................................258
Enabling the Remote Desktop ...............................................................................259
Adding Users to the Remote Desktop ....................................................................259
Data Mining ...................................................................................................................259
Gathering OS Information ................................................................................... 260
Harvesting Stored Credentials ...............................................................................261
Identifying and Exploiting Further Targets ................................................................... 262
Mapping the Internal Network ............................................................................. 263
Finding Network Information .............................................................................. 264
Identifying Further Targets ...................................................................................265
Pivoting ................................................................................................................ 266
Scanning Ports and Services and Detecting OS .....................................................267
Compromising Other Hosts on the Network Having the Same Password ............ 268
psexec ............................................................................................................................ 269
Exploiting Targets ..................................................................................................270
Conclusion ......................................................................................................................270
Dostları ilə paylaş: