Lesson 16 - Leveraging the Attack Flashcards
What is the term for a file containing data captures from system memory
Dump File
What is the random generated string that can be added to the password before hashing
Salt
What is the Brute Force attack in which multiple user accounts are tests with a dictionary common passwords
Password Spraying
Where were LInux passwords originally stored and where are the currently and why
/etc/passwd
/etc/shadow - uses a hashing algorithm based on distribution
Most recently SHA-256 or SHA-512
Where does Windows stored local usernames and passwords
Security Account Manager (SAM)
Passwords are stored in two types -
LanMan (LM) Hash.
NT Hash - simple MD4
What is LSASS in Windows
Windows Local Security Authority - LSA Secrets stores password details
What is the password cracking tools that gathers credentials by extracting key elements from memory
Mimikatz
Modern password and hash cracking tool that can speed up the process by using different attack methods (dictionary, brute, mask)
Hashcat
Parallel brute-forcer for network logins, Focus to support numerous network services that allow remote authentication
Medusa
Tool that allows to interpret results from Nmap scan to automatically start Medusa agains open port
Brutespray
Similar to Medusa but support parallel testing of several networks authentication. Bundled with pw-inspect
Hydra
Highly optimized password cracker and can identify a large set of hashes with its community edition - mult platforms
John the Ripper
URL Brute Forcer that comes bundled with different word lists geared towards web applications and site directories
DirBuster
Does Burpsuite has a password cracker
Yes. -has a module for that
What tools can I use for post-exploitation in a network that uses Windows AD
Responder.py
BloodhoundAD