Review #3_Password Attack with THC-Hydra

*Book Review,  Kali Linux Cookbook: Willie L. Pritchett, David De Smet (published 2013)

Chapter 7 : Escalating Privileges

Once you gain access to the target machine, you would prefer to have privileges like admin so you can get full control over the target. In this book, it shows different ways to escalate the privileges like using impersonation tokens or creating persistent backdoor. I practice local privilege escalation attack on a compromised machine to gain access to system or domain user account. By typing session -i 1 and connecting into number #1 session, you can type getsystem command which you will get once you run bypass command.

03-01

Chapter 8 : Password Attacks

I really like this chapter a lot because it has actual practice and tools description on it. Every time when i’ve learned about password attack it was general concept like brute force technique and rainbow attack without actual practice.

THC-Hydra password cracker, I tried to get a router password for my own house, but for some reason, the password wasn’t showing or just default password. This is a brute force technique, which inputs every password and id from namelist and john(password list).

03-03

03-02

*Book Review,  Kali Linux Cookbook: Willie L. Pritchett, David De Smet (published 2013)

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s