Windows Post Exploitation - Dumping & Cracking NTLM Hashes
Offered By: HackerSploit via YouTube
Course Description
Overview
Explore the process of dumping and cracking NTLM hashes on Windows systems in this informative video tutorial. Learn how to execute Pass-The-Hash attacks using NTLM hashes, and gain insights into post-exploitation techniques. Access additional resources, including a TryHackMe room and the winPEAS tool, to enhance your understanding of Windows security vulnerabilities. Discover practical applications of these techniques in penetration testing and cybersecurity assessments.
Syllabus
Windows Post Exploitation - Dumping & Cracking NTLM Hashes
Taught by
HackerSploit
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network