6 - System Hacking
Module 06 - System Hacking
Finding FQDN
Find FQDN of domain controller using Nmap
Dump and Crack SAM (Security Account Manager) hashes
WMIC (Windows Management Instrumentation Command) CLI to get info about local system
LLMNR / NBT-NS Spoofing
NTLM Hash crack
Rainbow table crack using Winrtgen
Hash dump with Pwdump7 and crack with Ophcrack
Pwdump7 (To dump password hashes)
Ophcrack (To crack password hashes)
Winrtgen โ Create Rainbow table
Rainbow Crack
Perform Active Online Attack to Crack the System's Password using Responder
Linux:
Windows
Linux:
Establish VNC connection to target machine using MSFVENOM and MSFCONSLE
Payload setup
Listener Setup
Execute Exploit
Create a Reverse TCP Connection
Privilege Escalation using MSFVenom and MSFConsole
Payload Setup
Listener Setup
Run Exploit
Post Exploitation Activities on Target
Hiding file in NTFS stream
Hiding Data Using White Space Steganography

Image Steganography
OpenStego
Hide Data
Extract Data
QuickStego
Hide Data
Extract Data
Steganographic Decoder
Covert Channels using Covert_TCP
Attacker:
Target:
Attacker

Additional Resources
Start Python webserver
Perform HTTP Request
Download file from FTP
System Hacking
Steganography
Last updated


