![]() ![]() With administrative rights is possible, for example, to dump password hash from Windows and Linux system. The password can be stored in clear text, in databases or hashed in files every time you copy these files and then you try, even in other environment, to extract the passwords you are doing an offline password attack. Think about /etc/shadow or SAM in Windows, but also browsers, routers, switches and any kind of client (ftp, e-mail, smb). The service that use as authentication a keyword needs to store it somewhere and somehow. The only thing you need is a free registration. I have the right to do up to 100 downloads of that magazines, so If you are interested on it you can download PenTest Extra 04_2013 for free using the following link. This is a part of my article “The Password Attacks on Kali Linux” published on PenTest Magazine. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |