Podcast
Questions and Answers
What hash version was passed to Responder?
What hash version was passed to Responder?
- Unknown
- Version 3 (v3)
- Version 2 (v2) (correct)
- Version 1 (v1)
What type of file is created in the example?
What type of file is created in the example?
- Password list file
- v1 file
- Root file
- v2 file (correct)
What is used to crack the password in the example?
What is used to crack the password in the example?
- Winexe
- Responder
- GitHub
- John the Ripper (correct)
What is the password that John the Ripper successfully cracks?
What is the password that John the Ripper successfully cracks?
What ruleset is used with John the Ripper in the example?
What ruleset is used with John the Ripper in the example?
What can be accessed using the credentials obtained?
What can be accessed using the credentials obtained?
What is Winexe used for?
What is Winexe used for?
What can Winexe be used to do on the target system?
What can Winexe be used to do on the target system?
What is the initial step in getting passwords with Responder?
What is the initial step in getting passwords with Responder?
What is observed on the Windows system during this process?
What is observed on the Windows system during this process?
What is obtained from the output on the Kali box?
What is obtained from the output on the Kali box?
What is done with the obtained hash?
What is done with the obtained hash?
Why is CTRL-C pressed on the Responder window?
Why is CTRL-C pressed on the Responder window?
What is the purpose of dumping hashes out of Responder?
What is the purpose of dumping hashes out of Responder?
What are the two new files generated after dumping hashes out of Responder?
What are the two new files generated after dumping hashes out of Responder?
What type of hash can be seen on the next slide?
What type of hash can be seen on the next slide?
What was the purpose of creating NetNTLMv1 and NetNTLMv2 hashes?
What was the purpose of creating NetNTLMv1 and NetNTLMv2 hashes?
What is used to add randomness to the NTLMv1 hash?
What is used to add randomness to the NTLMv1 hash?
What happens when a client connects to a host using NTLMv1?
What happens when a client connects to a host using NTLMv1?
What is the purpose of the second nonce in NTLMv2?
What is the purpose of the second nonce in NTLMv2?
How does NTLMv2 protect against rainbow tables?
How does NTLMv2 protect against rainbow tables?
What is the purpose of using Responder in capturing hashes?
What is the purpose of using Responder in capturing hashes?
Why is using a fixed challenge on the server side beneficial when capturing hashes?
Why is using a fixed challenge on the server side beneficial when capturing hashes?
Where can the latest version of Responder be obtained?
Where can the latest version of Responder be obtained?
What is the purpose of running the Get-ComputerDetail.ps1 script?
What is the purpose of running the Get-ComputerDetail.ps1 script?
What is needed to perform certain activities on the domain?
What is needed to perform certain activities on the domain?
What is the purpose of running the Invoke-Portscan.ps1 script?
What is the purpose of running the Invoke-Portscan.ps1 script?
What is the tool used to spoof LLMNR and NetBIOS Name Services responses?
What is the tool used to spoof LLMNR and NetBIOS Name Services responses?
What is used to crack credentials?
What is used to crack credentials?
What is the purpose of the PowerView.ps1 script?
What is the purpose of the PowerView.ps1 script?
What is required to perform some activities on the domain?
What is required to perform some activities on the domain?
What is the purpose of using cmdlets like Invoke-WebRequest and Invoke-Expression?
What is the purpose of using cmdlets like Invoke-WebRequest and Invoke-Expression?
What is the main theme of the summary?
What is the main theme of the summary?
What are the two ways Evil-WinRM can bring over code?
What are the two ways Evil-WinRM can bring over code?
What does the -s flag specify in Evil-WinRM?
What does the -s flag specify in Evil-WinRM?
What can be loaded from the script directory in Evil-WinRM?
What can be loaded from the script directory in Evil-WinRM?
What happens when we type 'menu' in Evil-WinRM?
What happens when we type 'menu' in Evil-WinRM?
What is the purpose of Bypass-4MSI in Evil-WinRM?
What is the purpose of Bypass-4MSI in Evil-WinRM?
How do you run a script in Evil-WinRM?
How do you run a script in Evil-WinRM?
What is included in the tool by default in Evil-WinRM?
What is included in the tool by default in Evil-WinRM?