Exercises on gaining access
As you work through the gaining access phase, please keep in mind that this stage is where you begin using what you learned and the information you collected during the reconnaissance and scanning phases to exploit openings, weaknesses, and vulnerabilities to gain access to environments. During this phase, you have initial access to the environment.
The following list of activities aims to give you a feel for using the tools. Please remember to stay ethical and don’t conduct these activities on any organization that would be deemed illegal.
IP address sniffing and spoofing:
- Try to use Wireshark to monitor network communications
- Try to use macchanger to spoof MAC addresses within a network
Code-based attacks:
- Try to use the Bed tool to find potential buffer overflow and format string exploits on applications
Exploiting services:
- Password cracking:
- Try to use Hydra (both the command line and GUI) for dictionary...