*Book Review,  Kali Linux Cookbook: Willie L. Pritchett, David De Smet (published 2013)

Chapter 7 : Escalating Privileges

Once you gain access to the target machine, you would prefer to have privileges like admin so you can get full control over the target. In this book, it shows different ways to escalate the privileges like using impersonation tokens or creating persistent backdoor. I practice local privilege escalation attack on a compromised machine to gain access to system or domain user account. By typing session -i 1 and connecting into number #1 session, you can type getsystem command which you will get once you run bypass command.

03-01

Chapter 8 : Password Attacks

I really like this chapter a lot because it has actual practice and tools description on it. Every time when i’ve learned about password attack it was general concept like brute force technique and rainbow attack without actual practice.

THC-Hydra password cracker, I tried to get a router password for my own house, but for some reason, the password wasn’t showing or just default password. This is a brute force technique, which inputs every password and id from namelist and john(password list).

03-03

03-02

*Book Review,  Kali Linux Cookbook: Willie L. Pritchett, David De Smet (published 2013)

Advertisements