Summary

In this chapter, we discussed how to escalate our privilege, and how to do network sniffing and spoofing. The purpose of the tools mentioned in this chapter is to get the highest access possible by elevating the privilege. Sniffing and spoofing can also be used to leverage access into a broader area, or to gain access into another machine within the network or outside the network, which probably contains more valuable information.

We start with attacking the password. There are two methods that can be used: offline attack and online attack. Most of the tools in an offline attack utilize rainbow tables to speed up the attack process, but it needs a large hard disk space. Offline attack has the advantage that it can be done at your own leisure ...

Get BackTrack 4: Assuring Security by Penetration Testing now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.