laatste deel ch05
parent
fe632b6ab5
commit
54c5cb8277
|
@ -184,3 +184,25 @@
|
|||
2. attacker relays authentication request messages to real server -> acts
|
||||
as authenticating client
|
||||
3. attacker receives authentication and returns error message to client
|
||||
|
||||
### Obtaining hashes
|
||||
|
||||
* Linux: `/etc/passwd` & `/etc/shadow`
|
||||
* Windows
|
||||
* Metasploit `hashdump`
|
||||
* minikatz
|
||||
* domain controller: Volume Shadow Copy Service (VSS) to create copy of OS
|
||||
partition including password db
|
||||
* requires shell access to target with system or admin
|
||||
* sniff authentication challenge/responses
|
||||
|
||||
## Pivoting
|
||||
|
||||
* methods
|
||||
* SSH port forwarding
|
||||
* can also act as SOCKS proxy
|
||||
* meterpreter
|
||||
* use `route` command to route packets through open connections
|
||||
* netcat
|
||||
* TCP tunnel
|
||||
* ...
|
||||
|
|
|
@ -1,7 +1,8 @@
|
|||
---
|
||||
title: Network Security Summary
|
||||
geometry:
|
||||
- top=30mm
|
||||
- left=30mm
|
||||
- right=30mm
|
||||
- top=15mm
|
||||
- left=15mm
|
||||
- right=15mm
|
||||
- bottom=15mm
|
||||
---
|
||||
|
|
Loading…
Reference in New Issue