From the course: Kali Linux for Advanced Pen Testing and Ethical Hacking
Unlock the full course today
Join today to access over 25,000 courses taught by industry experts.
Attacking the hives - Linux Tutorial
From the course: Kali Linux for Advanced Pen Testing and Ethical Hacking
Attacking the hives
- [Instructor] We're in our script folder, so let's run the attack. Python3 hives.py. And let's log into our management interface and set the attack going. HTTP://127.0.0.1/set?mutex=1. And let's go. So attack one has been initiated and if we go and check, we've executed the attack and we've logged in as bbqstew. So let's go back and now run phase two to escalate our privileges by extracting the system and SAM files. So attack stage two's been initiated and we've extracted the system, security, and SAM files. We've copied them to temp and we've been able to copy them down into our loot.tar archive. And if we finish the attack, we can see loot.tar. As an attacker we've now extracted the password hashes from the SAM file and either crack them or use them in a pass the hash attack. And this attack's demonstrated some additional ways we can use Kali Autopilot to create automated attack scripts.
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.