Ethical Hacking — Week 10
Privilege Escalation
Today’s session focused on attacking passwords. Passwords is used as one of the authentication factor, this can be based on either something you know or something you have or who you are
There two types of password attacks offline attacks and online attacks In offline attacks, hackers need physical access to the machine to be able to perform this attack, whereas in online attack, the attack can be done from a remote location.
The tools used in offline attack could be Rainbowcrack or Samdump2 or John the Ripper or Ophcrack or Crunch or Wyd
The tools used in online attack could be BruteSSH or Hydra or Dsniff or Hamster or TCPdump or Topic or Wireshark
Tags: Ethical Hacking
This entry was posted on Friday, May 15th, 2020 at 7:24 am and is filed under Database System -- Semester 3, Ethical Hacking -- Semester 4, Intelligent System -- Semester 4, Network Forensic -- Semester 5, Uncategorized. You can follow any responses to this entry through the RSS 2.0 feed. Both comments and pings are currently closed.