So for my first post I thought I would keep it simple. Hashes.
There are two broad types of attack when it comes to attacking a system or application that is protected by some sort of authentication mechanism:
- Password Guessing - where you *don't* have access to the stored password representation (hash) aka brute force attack.
- Password Cracking - where you *do* have access to the stored password representation
I am going to leave password guessing attacks for now but it maybe on another post in the future. But there are many simple tools out there (Hydra, Metasploit, Web Brute) so find a decent wordlist (Rockyou75, Openwall) and get brute forcing!
Resources for password lists:
- John - http://www.openwall.com/passwords/wordlists/
- Grimwepa - http://code.google.com/p/grimwepa/downloads/detail?name=rockyou-75.txt
- Skull Security - http://www.skullsecurity.org/wiki/index.php/Passwords
This is going to brief and I am sure i will add to this in the future. However, without a toolbox of zero-day exploits in your back pocket, capturing, breaking or reusing hashes is essential when assessing security of you network. Understanding what you have is key here.
A recent talk from IronGeek (Adrian Crenshaw) on pilfering windows targets gives a good overview of the types of common hashes you may encounter:
No comments:
Post a Comment