December 2016
Beginner
360 pages
9h
English
You have gathered a lot of information through your scanning, information-gathering, and enumeration processes—information such as usernames, groups, passwords, permissions, and other system details. Now you will use that information to dig into a system and gain access.
This step represents the point where you try to gain entry to a system with the intent of compromising it or gaining information of some sort. What you need to remember is that this process is reasonably methodical; it includes cracking passwords, escalating privileges, executing applications, hiding files, covering tracks, and concealing evidence. This chapter covers cracking passwords.
In this chapter, you will learn to: