Exploiting services
Exploiting services and systems is one of the most common methods used to test gaining access to an environment. These types of exploitations count as misconfigurations or weak configurations that can be exposed for access. We will talk about a few common methods in the following subsections:
- Password cracking
- Pass-the-hash attacks
- Web app attacks
Password cracking
Password cracking attacks are one of the most popular methods used to exploit services. The minute you publish any service publicly, you will notice attackers trying to gain access to the service using one of the many password-cracking methods available.
Passwords used to be the first and only defense mechanism to protect access to services and systems. Lately, most organizations have gradually started to configure and enforce multi-factor authentication (MFA) to reduce the risk of password-cracking attacks and techniques. However, you might be surprised that password cracking...