Credential harvesting is the process of identifying the usernames, passwords, and hashes that can be utilized to achieve the objective set by the organization for a penetration testing/red team exercise activity. In this section, we will walk through three different types of credential harvesting mechanism that are typically used by attackers who use Kali Linux.
Credential harvesting and escalation attacks
Password sniffers
Password sniffers are a set of tools/scripts that typically perform man-in-the-middle attacks through discovery, spoofing, sniffing the traffic, and by proxying.
In this section, we will explore BetterCap to capture the SSL traffic on the network so that we can capture the credentials of the network users...