From the course: Kali Linux for Advanced Pen Testing and Ethical Hacking

Unlock the full course today

Join today to access over 25,000 courses taught by industry experts.

Attacking the hives

Attacking the hives

- [Instructor] We're in our script folder, so let's run the attack. Python3 hives.py. And let's log into our management interface and set the attack going. HTTP://127.0.0.1/set?mutex=1. And let's go. So attack one has been initiated and if we go and check, we've executed the attack and we've logged in as bbqstew. So let's go back and now run phase two to escalate our privileges by extracting the system and SAM files. So attack stage two's been initiated and we've extracted the system, security, and SAM files. We've copied them to temp and we've been able to copy them down into our loot.tar archive. And if we finish the attack, we can see loot.tar. As an attacker we've now extracted the password hashes from the SAM file and either crack them or use them in a pass the hash attack. And this attack's demonstrated some additional ways we can use Kali Autopilot to create automated attack scripts.

Contents