π―Skills Assessment - Complete Password Attacks Workflow
π― Overview
ποΈ Attack Chain Architecture
Complete Workflow
Initial Recon β SSH Brute Force β Credential Hunting β Pivoting β Internal Enum β Share Analysis β Password Vault Cracking β Privilege Escalation β Domain CompromiseKey Learning Objectives
π Phase 1: Initial Reconnaissance & Foothold
Target Information
Network Enumeration
Username Generation with Username-Anarchy
Installation and Setup
Generated Username Patterns
SSH Brute Force Attack
Hydra SSH Attack
Successful SSH Access
π΅οΈ Phase 2: Credential Hunting
Bash History Analysis
Extracted Credentials
π Phase 3: Network Pivoting
Ligolo-ng Setup
Download and Extract
File Transfer Setup
Proxy and Agent Setup
Network Routing Configuration
π Phase 4: Internal Network Reconnaissance
Target Enumeration
Credential Validation with NetExec
RDP Connection with File Sharing
π Phase 5: Network Share Analysis
Share Enumeration
Snaffler Automated Credential Discovery
Tool Transfer and Execution
Snaffler Results
π Phase 6: Password Vault Cracking
Password Safe File Extraction
Hashcat Password Vault Cracking
Identify Hash Mode
Crack Password Vault
Password Vault Access
βοΈ Phase 7: Privilege Escalation
Credential Validation
Administrative Access via RDP
Mimikatz LSASS Dumping
Tool Transfer
Memory Credential Extraction
π Phase 8: Domain Compromise
Pass-the-Hash Attack
NTDS.dit Extraction
π― Skills Assessment Questions
Question 1: NEXURA\Administrator NTLM Hash
π§ Tools Integration Summary
Tools Used in Workflow
Phase
Tool
Purpose
Alternative
Command Reference Quick Sheet
π‘ Key Learning Points
Attack Chain Insights
Defensive Lessons
Methodology Validation
Last updated