SANS Penetration Testing: Monthly Archives: Jul 2013

Ever Crack a Password using a Cisco Device?*

[Editor's Note: Here's a short but sweet article by Tim Medin on using Cisco IOS's own capabilities for decoding Type 7 passwords. Now, you might think — "Why don't I just use one of the conversion websites on the Internet for decoding that?" Or, "I know a free downloadable hacker tool that does just that." … Continue reading Ever Crack a Password using a Cisco Device?*


Plundering Windows Account Info via **Authenticated** SMB Sessions

Rpcclient is Your Friend! By Ed Skoudis I absolutely adore the Server Message Block (SMB) protocol. Sure, it's ugly and bewilderingly complex. But, what I love is the raw power SMB provides for manipulating Windows environments during a penetration test. Via SMB, you can remotely access file shares, the registry, services, domain authentication, and much … Continue reading Plundering Windows Account Info via **Authenticated** SMB Sessions


Setting up Backdoors and Reverse Shells on VMware Hypervisors

[Editor's Note: In this article, Dave Shackleford talks about how penetration testers can take advantage of some really useful capabilities of the Linux-derived and Linux-like structure of VMware's virtualization infrastructure to set up backdoors to access a VMware hypervisor machine. He covers some classic ESX stuff along with some techniques for the VMware ESXi hypervisor. … Continue reading Setting up Backdoors and Reverse Shells on VMware Hypervisors


Anti-Virus Evasion: A Peek Under the Veil

[Editor's Note: In this article, Mark Baggett summarizes some of the Anti-Virus evasion tactics of the past year or two, and then cranks it up a notch, by digging into the details of some recent AV-dodging techniques useful to penetration testers. To be effective penetration testers, we need to model the techniques used by the … Continue reading Anti-Virus Evasion: A Peek Under the Veil


So You Wanna Be a Pen Tester? 3 Paths To Consider

(Blog Updated: 1/10/18) Tips for Entering the Penetration Testing Field By Ed Skoudis It's an exciting time to be a professional penetration tester. As malicious computer attackers amp up the number and magnitude of their breaches, the information security industry needs an enormous amount of help in proactively finding and resolving vulnerabilities. Penetration testers … Continue reading So You Wanna Be a Pen Tester? 3 Paths To Consider