Description
Nearly all pen testing assignments or hacking attempts employ brute-force tactics against weak passwords of the different system services such as Remote Desktop Protocol (RDP), Server Message Block (SMB), Secure Shell Protocol (SSH) to gain access to the victim’s machine.
Service Exploitation Techniques Covered in the Learning Path:
- RDP Bruteforcing
- SMB Enumeration
- WinRM Bruteforcing
- WinRM Bruteforcing
- SSH Cracking
- EternalBlue exploit
- Autoblue exploit
- MySQL Password Bruteforcing
- FTP Password Cracking