Sensitive-information gathering
Often there are scenarios where admins have to write scripts to automate the process on thousands of computers in a corporate network. Being on each and every system to configure them individually is a tedious and time consuming task. There could be situations where, because of negligence, sensitive files just keep lying around in the systems. Such files may contain passwords. Once we retrieve hashes of a compromised system we can use them to perform PTH (Pass the Hash) attack and gain access to different accounts found on the system. Similary, if users have same passwords being used over multiple systems the same hash can be used on another machine to gain that users access using the PTH attack. There are ample places we might find sensitive information that could help us elevate privileges.
Getting ready
A Windows system, a Kali machine, and remote-shell access to the compromised machine is pretty much all that is needed for this recipe.
How to do it...
- Use...