Johnny

0

Lab 2: Test the complexity of a Windows System, Cracking Windows hashes using Johnny When cracking Windows passwords if LM hashing is not disabled, two hashes are stored in the SAM database. SAM is Security Accounts Manager. It stores the LM & NTLM hashes in an encrypted form. So first we have to decrypt or dump the hashes into a...

Bluelog

0

Simple Bluetooth Discovery with Bluelog Bluelog is a simple Bluetooth scanner that is designed to essentially do just one thing, log all the discoverable devices in the area. It is intended to be used as a site survey tool, identifying the number of possible Bluetooth targets there are in the surrounding environment. This tool only shows visible devices like PCs,...

Metasploit for Penetration Testing and Exploitation – 2024

0

Metasploit is a powerful and widely used framework for penetration testing and exploitation. It provides security professionals with tools to discover vulnerabilities, exploit them, and assess the security posture of systems. This guide will walk you through the installation process, working methods, and provide examples of how to use Metasploit effectively. Key Features of Metasploit: Exploitation: Metasploit offers a large collection...