Tag: credentials

SMB

Identify valid credentials within a network

CredNinja is a multithreaded tool designed to identify if credentials are valid, invalid, or local admin valid credentials within a network at-scale via SMB. This tool is intended for penetration testers who want to perform an engagement quickly and efficiently. While this tool can be used for more covert operations (including some additions below), it …

Passwords, Penetration Testing

Dump credentials stored in Memory

Windows authentication system stores in memory users credentials. Windows caches user’s credentials so she can access for ex. network resources without having to enter her password constantly. There is a tool named Windows Credentials Editor (WCE) from Amplia Security company that can be used to to list logon sessions and add, change, list and delete …

Sniffing, Wireshark

Sniffing email passwords with Wireshark

> Open Wireshark.   > Select an interface and start capturing in promiscuous mode.   > To capture credentials from POP apply this filter: pop.request.command == "USER" || pop.request.command == "PASS"pop.request.command == "USER" || pop.request.command == "PASS"   > To capture credentials from IMAP apply this filter: imap.request contains "login"imap.request contains "login"   > To …

Metasploit, Phishing

Let’s go Phishing

Phishing is an attempt to steal sensitive information by impersonating a well known organization or website. In the same manner you can trick a user to steal her MySQL credentials. One of the abilities of Metasploit is this, mimic known services and capture user credentials. Among the various capture modules there is a module called …