Module 06: System Hacking
Lab 1: Gain Access to the System
Task 1: Perform Active Online Attack to Crack the System’s Password using Responder
### Step -1 : Using Responder on ParrotOS
sudo responder -I eth0
Capturing the hash via logging into :
run (Win+R) --> //CEH-Tools
## Step -2 : Cracking hash using JohntheRipper
john <input_file.txt>
Task 2: Gain Access to a Remote System using Reverse Shell Generator
Step -1 : Reverse shell generator
1.1 : Running reverse shell generator on docker :
docker run -d -p 80:80 reverse_shell_generator
1.2 : Reverse shell generator on web :
https://www.revshells.com
Step -2 : Modules used for cracking :
1. Msfvenom
2. HoaxShellTask 3: Perform Buffer Overflow Attack to Gain Access to a Remote System
1. Setting Up the Vulnerable Server
2. Installing and Setting Up Immunity Debugger
3. Establishing a Connection with Netcat
4. Performing Spiking
5. Conducting Fuzzing
6. Generating and Identifying Offsets
7. Locating Bad Characters
8. Identifying Vulnerable Modules
9. Finding a JMP ESP Address
10. Crafting and Running the Exploit
Lab 2: Perform Privilege Escalation to Gain Higher Privileges
Task 1: Escalate Privileges by Bypassing UAC and Exploiting Sticky Keys
Lab 3: Maintain Remote Access and Hide Malicious Activities
Task 1: User System Monitoring and Surveillance using Spyrix
Task 2: Maintain Persistence by Modifying Registry Run Keys
Lab 4: Clear Logs to Hide the Evidence of Compromise
Task 1: Clear Windows Machine Logs using Various Utilities
Task 2: Clear Linux Machine Logs using the BASH Shell
Lab 5: Perform Active Directory (AD) Attacks Using Various Tools
Task 1: Perform Initial Scans to Obtain Domain Controller IP and Domain Name
Task 2: Perform AS-REP Roasting Attack
Task 3: Spray Cracked Password into Network using CrackMapExec.
Task 4: Perform Post-Enumeration using PowerView
Task 5: Perform Attack on MSSQL service
Task 6: Perform Privilege Escalation
Task 7: Perform Kerberoasting Attack
Last updated