Sensitive-information gathering
Often there are scenarios where network admins have to write scripts to automate the process on thousands of computers in a corporate network. Being on each and every system to configure them individually is a tedious and time consuming task. There could be situations where, because of negligence, sensitive files just keep lying around in the systems. Such files may contain passwords. Once we retrieve hashes of a compromised system we can use them to perform PTH (Pass the Hash) attack and gain access to different accounts found on the system. Similary, if users have same passwords being used over multiple systems the same hash can be used on another machine to gain that users access using the PTH attack. There are ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Read now
Unlock full access