O'Reilly logo

BackTrack 4: Assuring Security by Penetration Testing by Shakeel Ali, Tedi Heriyanto

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Summary

In this chapter, we discussed how to escalate our privilege, and how to do network sniffing and spoofing. The purpose of the tools mentioned in this chapter is to get the highest access possible by elevating the privilege. Sniffing and spoofing can also be used to leverage access into a broader area, or to gain access into another machine within the network or outside the network, which probably contains more valuable information.

We start with attacking the password. There are two methods that can be used: offline attack and online attack. Most of the tools in an offline attack utilize rainbow tables to speed up the attack process, but it needs a large hard disk space. Offline attack has the advantage that it can be done at your own leisure ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required