Skip to Content
The Art of Network Penetration Testing
book

The Art of Network Penetration Testing

by Royce Davis
December 2020
Intermediate to advanced
304 pages
8h 57m
English
Manning Publications
Content preview from The Art of Network Penetration Testing

8 Windows post-exploitation

This chapter covers

  • Maintaining persistent Meterpreter access
  • Harvesting domain-cached credentials
  • Extracting clear-text credentials from memory
  • Searching the filesystem for credentials in configuration files
  • Using Pass-the-Hash to move laterally

Now that our movie heist crew has successfully broken into or penetrated several areas of their target facility, it’s time for them to move on to the next phase of their engagement. Smash into the vault room, grab the jewels, and run? No, not quite yet. That would cause a lot of commotion, and they would probably get caught. Their plan instead is to blend in with the workers at the facility and slowly remove incrementally larger amounts of loot without arousing suspicions ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Penetration Testing

Penetration Testing

Georgia Weidman
Penetration Testing: A Survival Guide

Penetration Testing: A Survival Guide

Wolf Halton, Bo Weaver, Juned Ahmed Ansari, Srinivasa Rao Kotipalli, Mohammed A. Imran

Publisher Resources

ISBN: 9781617296826Supplemental ContentPublisher SupportOtherPublisher WebsiteSupplemental ContentPurchase Link