Overview
In this lab you, will take advantage of the lack of disk encryption and exploit a local system. When the operating system is not encrypted, an attacker with physical access can leverage this to their advantage and gain access to your system using a number of freely available tools. Various tools such as Live DVDs or even the Windows recovery console can provide ways for the attacker to see the files you have on your system as well as download or upload malware and run it on your system.
outcomes:
In this lab you will learn to:
- Exploit a Windows machine.
- Perform post-exploitation tasks.
Courses
Key terms and descriptions
Kali
A widely used Linux distribution with various security tools installed.
md5sum
A Linux command to get the MD5 hash of a file.
fgdump.exe
Dumps passwords hashes in Windows.
Windows Defender
Built-in antivirus for Windows 10.
cp
The command to copy a file in Linux.