- 46
- 3 759
Geeki Native
United States
เข้าร่วมเมื่อ 9 ก.ย. 2024
Crack the SAM Database with John the Ripper
TestOut Ethical Hacker
Crack the SAM Database with John the Ripper
As the cybersecurity specialist for your company, you're performing a penetration test. As part of this test, you're checking to see if the Security Account Manager (SAM) passwords from a Windows system can be cracked using John the Ripper.
In this lab, your task is to crack the SAM passwords as follows:
Disclaimer this video is for educational purposes only!
Crack the SAM Database with John the Ripper
As the cybersecurity specialist for your company, you're performing a penetration test. As part of this test, you're checking to see if the Security Account Manager (SAM) passwords from a Windows system can be cracked using John the Ripper.
In this lab, your task is to crack the SAM passwords as follows:
Disclaimer this video is for educational purposes only!
มุมมอง: 99
วีดีโอ
Configure Account Password Policies
มุมมอง 3314 วันที่ผ่านมา
TestOut Ethical Hacker Configure Account Password Policies You are the IT administrator for a small corporate network. You are attempting to improve the password security of the Windows 10 laptop in the Lobby. In each policy, the Explain tab provides a description of the effects of the policy to help you identify which policy to configure with which value. In this lab, your task is to use the L...
Crack a Password with John the Ripper
มุมมอง 20614 วันที่ผ่านมา
Crack a Password with John the Ripper You are the IT security administrator for a small corporate network. You've received a zip file that contains sensitive password-protected files. You need to access these files. The zip file is located in the home directory. In this lab, your task is to use John the Ripper to: Crack the root password on Support. Crack the password of the protected.zip file ...
Crack a Password with Rainbow Tables
มุมมอง 5514 วันที่ผ่านมา
Test Out Ethical Hacker Crack a Password with Rainbow Tables While doing some penetration testing for your company, you captured some password hashes. The password hashes are saved in the root user's home directory /root/captured_hashes.txt. Now you want to hack these passwords using a rainbow table. The password requirements for your company are as follows: The password must be 20 or more char...
Analyze a USB Keylogger Attack Part II
มุมมอง 4714 วันที่ผ่านมา
TestOut Ethical Hacker Analyze a USB Keylogger Attack 2 Recently, the administrative assistant found a foreign device connected to the ITAdmin computer while updating some of their hardware. The device was turned over to you, and you have determined that it is a keylogger. You need to sift through the information on the keylogger to find which accounts may be compromised. In this lab, your task...
Analyze a USB Keylogger Attack
มุมมอง 11914 วันที่ผ่านมา
Testout Ethical Hacker Analyze a USB Keylogger Attack The CEO of CorpNet.xyz has hired your firm to obtain some passwords for their company. A senior IT network administrator, Oliver Lennon, is suspected of wrongdoing and suspects he is going to be fired from the company. The problem is that he changed many of the standard passwords known to only the top executives, and now he is the only one t...
Scan for Vulnerabilities on a WAP
มุมมอง 6014 วันที่ผ่านมา
Test Out Ethical Hacker Scan for Vulnerabilities on a WAP You are the IT security administrator for a small corporate network. You perform vulnerability scans on your network. You need to verify the security of your wireless network and your Ruckus wireless access controller. In this lab, your task is to: Run a vulnerability scan for the wireless access controller (192.168.0.6) using Security E...
Scan for Vulnerabilities on a Security Appliance
มุมมอง 3614 วันที่ผ่านมา
Test Out Ethical Hacker Scan for Vulnerabilities on a Security Appliance You are the IT security administrator for a small corporate network. You perform regular vulnerability scans on your network. Recently, you added a new network security appliance (NSA) to the network. You used the ITAdmin workstation when you configured the NSA. In this lab, your task is to: Run a vulnerability scan for th...
Scan for Vulnerabilities on a Domain Controller
มุมมอง 4614 วันที่ผ่านมา
TestOut Ethical Hacker Scan for Vulnerabilities on a Domain Controller You are the IT security administrator for a small corporate network. You are performing vulnerability scans on your network. Use the Security Evaluator tool to run a vulnerability scan on the CorpDC domain controller. In this lab, your task is to: Run a vulnerability scan for the CorpDC domain controller using the Security E...
Scan for Vulnerabilities on a Linux Server
มุมมอง 4521 วันที่ผ่านมา
TestOut Ethical Hacker: Scan for Vulnerabilities on a Linux Server You are the IT security administrator for a small corporate network. You need to use a vulnerability scanner to check for security issues on your Linux computers. In this lab, your task is to: Use the Security Evaluator to check the security: On the Linux computer with the 192.168.0.45 IP address. On the Linux computers in the I...
Scan for Vulnerabilities on a Windows Workstation
มุมมอง 4721 วันที่ผ่านมา
Testout Ethical Hacker: Scan for Vulnerabilities on a Windows Workstation You are the IT security administrator for a small corporate network. You are performing vulnerability scans on your network. Mary is the primary administrator for the network and the only person authorized to perform local administrative actions. The company network security policy requires complex passwords for all users...
Prevent Zone Transfer
มุมมอง 2521 วันที่ผ่านมา
TestOut Ethical Hacker Pro: Prevent Zone Transfer As part of your ethical hacking testing, you determined that you can obtain the zone information from the CorpDC3 server, which is a domain controller in the CorpNet.local domain. This server holds an Active Directory-integrated zone for the CorpNet.local domain. You have recommended that the company secure zone data to prevent anyone from copyi...
Perform Enumeration of MSSQL with Metasploit
มุมมอง 3521 วันที่ผ่านมา
TestOut Ethical Hacker: Perform Enumeration of MSSQL with Metasploit You are an ethical hacker consultant working for CorpNet. CorpNet wants you to discover weaknesses in their public-facing servers. From outside of the CorpNet network, you have discovered one of their Windows servers named www3.corpnet.xyz with an IP address of 198.28.1.3. You believe a Microsoft SQL server is installed on thi...
Perform Enumeration with Metasploit
มุมมอง 11721 วันที่ผ่านมา
TestOut Ethical Hacker: You are an ethical hacker consultant working for CorpNet. CorpNet wants you to discover weaknesses in their public-facing servers. From outside of the CorpNet network, you are able to deploy a Metasploit payload to one of their Windows servers named www3.corpnet.xyz. You are determining whether the Windows patches are up to date or if there is an unpatched vulnerability ...
Perform Enumeration with Nmap
มุมมอง 4421 วันที่ผ่านมา
TestOut Ethical Hacker: ou are the IT security administrator for a small corporate network. You're scanning your local network to determine potential vulnerabilities. In this lab, your task is to complete the following: Use Zenmap to determine the operating system of the hosts on your network. On ITAdmin, use net view to check for shared folders on CorpFiles12 and CorpFiles16. Map the H: drive ...
Disable Windows Services : TestOut Ethical Hacker Pro
มุมมอง 107หลายเดือนก่อน
Disable Windows Services : TestOut Ethical Hacker Pro
Preform Reconnaissance with Nmap-Ethical Hacker
มุมมอง 85หลายเดือนก่อน
Preform Reconnaissance with Nmap-Ethical Hacker
Implement Physical Security Countermeasures - Ethical Hacker
มุมมอง 18หลายเดือนก่อน
Implement Physical Security Countermeasures - Ethical Hacker
Identify Social Engineering Ethical Hacker
มุมมอง 29หลายเดือนก่อน
Identify Social Engineering Ethical Hacker
Configure Windows Defender Application Control
มุมมอง 166หลายเดือนก่อน
Configure Windows Defender Application Control