Back to Browse

Privilege Escalation Techniques | 7. Windows Password Mining

626 views
Sep 27, 2021
29:09

Privilege Escalation Techniques is available from: Packt.com: https://bit.ly/3u7eykV Amazon: https://amzn.to/3F14myL This is the “Code in Action” video for chapter 7 of Privilege Escalation Techniques by Alexis Ahmed, published by Packt. It includes the following topics: 00:11 Searching for application passwords 13:53 Dumping Windows hashes 20:04 Cracking Windows hashes :Privilege escalation is a crucial step in the exploitation life cycle of a penetration tester. It helps penetration testers to set up persistence and facilitates lateral movement. This book is one-of-a-kind as it covers a range of privilege escalation techniques and tools for both Windows and Linux systems. Connect with Packt: Find us on Facebook: http://www.facebook.com/PacktPub Find us on Twitter: http://www.twitter.com/packtpub Video created by Alexis Ahmed

Download

0 formats

No download links available.

Privilege Escalation Techniques | 7. Windows Password Mining | NatokHD