CHAPTER 8 Cracking Passwords
You have gathered a lot of information through your scanning, information-gathering, and enumeration processes—information such as usernames, groups, passwords, permissions, and other system details. Now you will use that information to dig into a system and gain access.
This step represents the point where you try to gain entry to a system with the intent of compromising it or gaining information of some sort. What you need to remember is that this process is reasonably methodical; it includes cracking passwords, escalating privileges, executing applications, hiding files, covering tracks, and concealing evidence. This chapter covers cracking passwords.
In this chapter, you will learn to:
- Know good passwords ...
Get Penetration Testing Essentials now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.