Jun
16
2020

Week_10_Ethical Hacking and Penetration Testing_Privilege Escalations

Disclaimer: My post is for academic purposes only, How to use this information is the visitor’s responsibility.

This week, I have learned about privilege escalations. Privilege escalations are the act of exploiting a bug, design flaw, or configuration oversight in an operating system or software application to gain elevated access to resources that are normally protected from an application or user. There are no set rules of how to do privilege escalations since every server have different ways to do privilege escalations. You can bruteforce your way for the admin password or you can use man in the middle attackand many more.

For brute force attack, you need a wordlist that contain words for the attack, usually this attack is not recommended because of how long the attack will succeed and it have a very low chance of succeeding with this attack. You can use tools such as crunch to make the wordlist for the attack and depending on the target, you can use many tools to initiate the brute force attack, for example you can use aircrack to bruteforce a wifi password. 

Man in the middle attack is an attack where the attacker secretly relays and possibly alters the communications between two parties who believe that they are directly communicating with each other. There are a lot of ways to do man in the middle attack, you can use tools such as ettercap or do it manually via social engineering.

Written by muhammaddaffa in: Other |

No Comments »

RSS feed for comments on this post. TrackBack URL


Leave a Reply

Powered by WordPress. Theme: TheBuckmaker. Zinsen, Streaming Audio