YoVDO

Windows Post Exploitation - Dumping & Cracking NTLM Hashes

Offered By: HackerSploit via YouTube

Tags

Ethical Hacking Courses Cybersecurity Courses Penetration Testing Courses

Course Description

Overview

Explore the process of dumping and cracking NTLM hashes on Windows systems in this informative video tutorial. Learn how to execute Pass-The-Hash attacks using NTLM hashes, and gain insights into post-exploitation techniques. Access additional resources, including a TryHackMe room and the winPEAS tool, to enhance your understanding of Windows security vulnerabilities. Discover practical applications of these techniques in penetration testing and cybersecurity assessments.

Syllabus

Windows Post Exploitation - Dumping & Cracking NTLM Hashes


Taught by

HackerSploit

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network