17. Alternate Data Streams Demonstration – B Let’s try how about notepad? And I’m going to start this with a colon, and I’m just saying U-D-E-M-Y um txt. Okay. And I’m going to put in a whole bunch of junk in here, all right? And I’m going to go ahead and save it, get out […]
13. Demonstration MimiKatz Now guys, if nothing I have shown you has scared you yet, this will definitely scare you if you’re not familiar with it. Microsoft in Vista and above attempted to create a single sign on in its Windows Seven and above operating system. We know that the LSAS, the Local System Authority, […]
9. Countermeasures: Stealing the Passwords, Syskey, Salting Now there are just a couple more things that I wanted to reiterate before we moved on out of the password cracking. And I probably should mention the password cracking that is offline in nature. I’m hoping you put two and two together at this point where the […]
6. Cracking Windows Passwords – C Okay, so in our last video, we saw how if we change the Sam database to something other than Sam, and the SEC event dot ebt to something other than that, restart the machine underneath some other operating system, it will create those. That’s all fine and well and […]
1. Introduction to System Hacking Introduction In the system hacking section. We’ll discuss keystroke, loggers password, guessing tools as well as password cracking the sand database and some of the insecurities as well. We’ll discuss the various tools that are available for us. We’ll discuss rainbow tables as well as password snipping, some Windows authentication […]
11. Core Impact Overview I’m going to show you how we can use Cornback to perform a network assessment and determine the risk present on any given network. To start off, I’m going to enumerate my network. I can import the results from vulnerability scanners and use that as my starting point, but can also […]
7. Basic Types of Buffer Overflows And Demo 03 So let’s real quickly talk about the different stages of exploit development. The first stage is we’re going to create a shell code. Now, I get this name because it’s the code we produce that creates a shell, all right? A shell or a command prompt […]
5. Basic Types of Buffer Overflows And Demo 01 Is as we’re coming back here, here’s several instructions, okay? This happens to be an if instruction in a symbol. It tells us to jump if zero to this particular memory address. We need to keep in mind that there are three main programming constructs and […]
1. Introduction to Advanced System Explotation In this section on advanced exploit techniques we’ll learn how exploits actually work we’ll learn about buffer overflows buffer overflow for prevention processor evolution stacks indepth the different types of buffer overflows heat memory stages of exploit development prevention such as data execution prevention that will discuss the metasploit […]
5. SQL Injection Demo 1 Okay, so the first thing we’re going to do is we’re going to connect to the ISO image that’s out on our drive of our landing machine. And the ISO image on it under Tools for Pods is called DB web app. Great. Now the next thing we’ll do is […]