Back to Browse

Tutorial Series: Ethical Hacking Practical - Post Exploitation

2.9K views
Dec 6, 2019
46:28

## ETHICAL HACKING PRACTICAL: TUTORIAL SERIES FOR BEGINNERS ### Ethical Hacking Step by Step. 01. Footprinting 02. Reconnaissance 03. Enumeration 04. Vulnerability Scan 05. Password Cracking 06. Privilege Escalation 07. Exploitation 08. Post Exploitation 09. Maintaining Access 10. Web Apps Hacking Step 08. Post Exploitation This tutorial explains several post-exploitation techniques you can do as an ethical hacker after you have successfully gained full access to your target host. We start with pivoting, followed by dumping the hashes on the target hosts, then use the pass-the-hash that allows the attacker to authenticate to a remote server or service by using the underlying NTLM or LanMan hash of a user's password, instead of requiring the associated plaintext password as is normally the case. Other post-exploitation techniques explained also include deleting/wiping Windows event logs and changing the MACE (modified, access, creation, and entry) attributes of a file by utilizing timestomp, getting a screenshot of our target host, and much more. VMs: Windows 7 (TEST-WIN7), Windows Server 2003 (DEN-WEB2, DEN-WEB3, DEN-SQL1) Tools: metasploit framework Reference: https://www.offensive-security.com/metasploit-unleashed/msf-post-exploitation/

Download

1 formats

Video Formats

360pmp477.6 MB

Right-click 'Download' and select 'Save Link As' if the file opens in a new tab.

Tutorial Series: Ethical Hacking Practical - Post Exploitation | NatokHD