Password Attacks
Password Attacks
Credential Hunting
Windows Credential Locations
Location
Description
Access Method
Linux Credential Locations
Location
Description
Access Method
Hash Extraction Techniques
Windows SAM Database
LSASS Memory Dumping
NTDS.dit from Domain Controllers
Linux /etc/shadow
Password Cracking
Hashcat
John the Ripper
Pass-the-Hash Attacks
Using Mimikatz (Windows)
Using Impacket (Linux)
CrackMapExec for PTH
Kerberos Attacks
Kerberoasting
AS-REP Roasting
Golden Ticket Attack
Silver Ticket Attack
Password Spraying
Windows Internal Networks
Web Applications
Credential Reuse and Pivoting
Testing Credentials Across Network
Last updated