Hello Everyone!
This is SaintDruG for Black Hat Ethical Hacking .
Todays Hacking Minutes Series,
We will See how to take over a machine, dump the hash key from a user, and decrypt by cracking the hash key to reveal in plain text the password.
Doing this, we will go through creating a payload, copying the payload
remotely to a machine, in this example we will use a kali machine,
running on a macbook air, and send it to a raspberry pi
since, the rpi, has no 32bit or 64bit architecture,
and uses ARM architecture we will generate the payload
using python, knowing that the rpi is running Parrot OS Linux.
We will open a listener using metasploit
execute the payload on the remote/victim machine.
we will use a post gather module specifically designed to work on arm/linux to gather the hash keys.
Then, we will copy that hash encrypted key and crack / brute-forcing it using John, on Kali, revealing in plain text the password.
Behind this technique, lies black hat and speed execution to get what is needed.
Its one example, how using social engineering techniques, explained in our other videos.
Same as SCP is also explained in another video, you can take over a machine.
And get the password in an encrypted state cracking it to plain text.
Having this password basically you not only OWN the machine, completely. But you escalate this, and start doing recon on that users personal life and using tools like Maltego or other techniques and Powerful recon scripts you can try that password against all his social media, emails gathered and check if it works giving you in less than 10 minutes after a successful social engineering / phishing attack everything about that person.
This is one example, using a combination of techniques and knowledge of certain frameworks and tools optimized for speed and execution that black hat hackers use against their victim.
We @ Black Hat "Ethical" Hacking, have the skill to show you
just a preview of real demos real life attacks that happen every second.
- Security is a myth..
Our Black Box Penetration Testing Involve a very real simulation of such attacks.
Hope you enjoyed this, and stay tuned for more!
Disclaimer: This Video is for Educational Purpose Only, what you do is your responsibility and Black Hat Ethical Hacking, SaintDruG or anyone involved, is not held accounted for if any damage for any reason occurs. As a bonus, you can get a free Link on How a Complete Target Scan is done, involving over 2.5K lines - consider it as a FREE Course! Download for Free: https://github.com/blackhatethicalhacking
Its all about the Black Hat "Mindset" - To Understand
this, you need to unlearn and learn again, the mindset.
Sound Track:
ROYALTY FREE Background Music For Videos Fashion Films - Dark Hip-Hop Trap [Royalty Free - Commercial Use] Dark - Trap Kevin MacLeod - Spellbound Mind Trap Original Composition (Cinematic Dark Epic) Royalty Free Music Download for Free our Conky Theme https://github.com/blackhatethicalhacking/bheh_conky_theme
Support our work on Patreon:
https://www.patreon.com/blackhatethicalhacking
Source:
https://www.youtube.com/watch?v=C7dN1J_E3_QUploader:
Black Hat Ethical Hacking