Summary
In this chapter, we reviewed and explored Windows exploitation, covering the exploitation of protocols such as ARP and SNMP. We also discussed how Windows authenticates login accounts and Windows password hashes. There was discussion on obtaining and cracking passwords, including the use of brute force, dictionary, and rainbow tables to retrieve passwords. We finished up discussing authentication spoofing, privilege escalation, and application exploitation. All of these methods are used by attackers as well as pen testers when trying to exploit user accounts, network protocols, and Windows systems. Now that you are aware of these types of attacks, you can not only look for them within your network but can verify that proper compensating controls are in place to mitigate some of the activities an attacker might perform.
In the next chapter, we will move from the Windows operating system and see how attackers can take advantage and exploit the Linux operating system.