16A: Test Credentials Flashcards
3.1 Given a scenario, research attack vectors and perform network attacks. 5.3 Explain use cases of the following tools during the phases of a penetration test.
File containing data captured from system memory.
dump
A randomly generated string that can be added to the password before hashing.
salt
Type of password attack that compares encrypted passwords against a predetermined list of possible password values.
dictionary attack
Type of password attack where an attacker uses an application to exhaustively try every possible alphanumeric combination to crack encrypted passwords.
brute force attack
Type of password attack that can make use of word lists to create variants and combinations.
rule based attack
If the attacker’s dictionary is exhausted, the cracking tool can then try variations of the passwords by trimming or expanding words or substituting numbers or special characters for letters. It can also try specific combinations of characters using placeholders (i.e.,: ?a?a?d?d?d?d)
mask attack
Brute force attack in which multiple user accounts are tested with a dictionary of common passwords.
password spray
hash that starts with $1
MD5
hash that starts with $2a
blowfish
hash that starts with $5
SHA-256
hash that starts with $6
SHA-512
In Windows, this is a simple MD4 hash of the password (encoded as UTF-16 little endian). It is unsalted but allows passwords up to 128 characters long.
NT Hash
In Kerberos, a token issued to an authenticated account to allow access to authorized application servers.
Ticket Granting Ticket (TGT)
Used by The Windows Local Security Authority (LSASS) to store a variety of user, service, and application passwords.
LSA Secrets