O'Reilly logo

Kali Linux Intrusion and Exploitation Cookbook by Ishan Girdhar, Dhruv Shah

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Sensitive-information gathering

Often there are scenarios where network admins have to write scripts to automate the process on thousands of computers in a corporate network. Being on each and every system to configure them individually is a tedious and time consuming task. There could be situations where, because of negligence, sensitive files just keep lying around in the systems. Such files may contain passwords. Once we retrieve hashes of a compromised system we can use them to perform PTH (Pass the Hash) attack and gain access to different accounts found on the system. Similary, if users have same passwords being used over multiple systems the same hash can be used on another machine to gain that users access using the PTH attack. There are ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required