What are the goals of system hacking?
What is Password Cracking?
Used to recover passwords from computer systems and gain unauthorized access to vulnerable system
What are the different types of password attacks?
How Hash Passwords Are Stored in Windows SAM?
Windows uses a Security Account Manager (SAM) database file to store user passwords.
What is Kerberos Authentication?
What is Password Salting?
How to Defend Against Password Cracking?
What is Escalating Privileges?
What are the Types of Privilege Escalation?
What are Spectre and Meltdown Vulnerabilities?
What are Privilege Escalation Techniques?
How to Defend Against Privilege Escalation?
What type of applications do attackers execute?
What type of files do attackers try to hide?
What techniques do attackers use to cover tracks?
What is Vulnerability Exploitation?
Involves the execution of multiple complex steps to gain access to a remote system.:
What is are Exploit Sites?
Sites that are used to discover vulnerabilities and download or to develop exploits to perform remote exploitation on the target system. Sites include latest details of vulnerabilities. (Exploit Database, Security Focus, VulDB, MITRE CVE)
What is Buffer Overflow?
A buffer is an area of adjacent memory locations allocated to a program or app to handle its runtime data. Buffer Overflow is where an application or program accepts more data than allocated buffer. The vulnerability allows the app to exceed the buffer while writing data to the buffer and overwrite neighboring memory locations. Attackers take advantage of this by injecting malicious code into the buffer.
What are the types of Buffer Overflow?
What are the steps for Windows Buffer Overflow Exploitation?
What tools are used to identify Buffer Overflow?
How can you defend against Buffer Overflow?
What is Internal Monologue Attack?
Usually performed in a secure enviro where Security Provider Interface Interface (SSPI) from a user-mode app, a local procedure call to the NTLM authentication package is invoked to calculate the NetNTLM (a challenge-response authentication protocol) response in the context of the logged-on user.
What is Cracking Kerberos Password?
Kerberos is the most commonly used authentication protocol for network entities. Attackers target Kerberos auth protocol in two common ways: cracking the TGS and cracking the TGT