Red Team Toolkit
  • 👊Welcome!
  • Methodology
    • MITRE
    • NIST
    • OWASP
    • PTES
    • SANS
  • Reconnaissance
    • DNS Recon
    • Open Source Intelligence
    • Web Application Recon
  • Initial Access
    • Phishing
    • Web Authentication Bypass
    • Network Services Attacks
    • Breaching Active Directory
    • Windows Exploits
    • Linux Exploits
    • SQL Injection
    • XSS
    • Burp Suite
    • Hyrdra
    • Metasploit
    • Nessus
    • Wordlists
    • OWASP ZAP
  • Discovery
    • NMAP
    • PowerView
    • Active Directory Enumeration
    • Windows Post Exploitation Discovery
    • Linux Post Exploitation Discovery
    • Other Scanning Methods
  • Privilege Escalation
    • Password Cracking
    • AD Privilege Escalation
    • Local Windows Privilege Escalation
    • Linux Privilege Escalation
    • Mimikatz
  • Movement
    • Movement
    • Evasion
  • Collection
    • Persistence
    • Exfiltration
  • Other
    • Bookmarks
    • OpeSec
Powered by GitBook
On this page
  • Background
  • Tools

Was this helpful?

  1. Privilege Escalation

Password Cracking

Background

Password cracking is the process of attempting to gain unauthorized access to protected computer systems by guessing or cracking the password used to secure them. This is typically accomplished through various techniques such as dictionary attacks, brute force attacks, and other forms of password cracking software. The goal of password cracking is to obtain sensitive information such as login credentials, personal information, and other confidential data that is protected by passwords.

Tools

John the Ripper Hashcat Aircrack-ng L0phtCrack Cain and Abel Brutus Hydra Ncrack

ridenum.py 192.168.XXX.XXX 500 50000 dict.txt https://github.com/trustedsec/ridenum

Metasploit RID Cycling

use auxiliary/scanner/smb/smb_lookupsid
PreviousPrivilege EscalationNextAD Privilege Escalation

Last updated 1 year ago

Was this helpful?