O'Reilly logo

Kali Linux Intrusion and Exploitation Cookbook by Ishan Girdhar, Dhruv Shah

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 4. Network Exploitation

In this chapter, we will cover the following recipes:

  • Gathering information for credential cracking
  • Cracking FTP using custom wordlist
  • Cracking SSH using custom wordlist
  • Cracking HTTP using custom wordlist
  • Cracking MySql and PostgreSQL using custom wordlist
  • Cracking Cisco login using custom wordlist
  • Exploiting vulnerable services (Unix)
  • Exploiting vulnerable services (Windows)
  • Exploiting services using exploit-db scripts

Introduction

In the previous chapter, we enumerated the open ports and searched for possible vulnerabilities. In this chapter, we are going to perform penetration testing of the system over the network. For the purpose of demonstration, we have taken a vulnerable OS called Stapler, made by g0tmi1k. Stapler ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required