Description
Nearly all pen testing assignments or hacking attempts employ brute-force tactics against weak passwords of the different system services such as Server Message Block (SMB) and Secure Shell Protocol (SSH) to gain access to the victim’s machine.
Service Exploitation Techniques Covered in the Learning Path:
- SMB Enumeration
- WinRM Bruteforcing
- WinRM Bruteforcing
- SSH Cracking
- EternalBlue exploit
- Autoblue exploit
- MySQL Password Bruteforcing
- FTP Password Cracking