Chapter 4. Network Exploitation
In this chapter, we will cover the following recipes:
- Gathering information for credential cracking
- Cracking FTP using custom wordlist
- Cracking SSH using custom wordlist
- Cracking HTTP using custom wordlist
- Cracking MySql and PostgreSQL using custom wordlist
- Cracking Cisco login using custom wordlist
- Exploiting vulnerable services (Unix)
- Exploiting vulnerable services (Windows)
- Exploiting services using
exploit-db
scripts