O'Reilly logo

Mastering Kali Linux for Advanced Penetration Testing - Second Edition by Vijay Kumar Velu

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Veil-Pillage

Veil-Pillage is a module that was developed as part of the main Veil framework which can be utilized by the attackers during post-exploitation. In this section, we will take a quick look at how Veil-Pillage is organized and the different type of modules that can be utilized to achieve our goal of penetration testing. The following diagram describes the different sections of the Veil-Pillage framework:

Further details of all the available modules in pillage framework are as follows:

  • Credentials: Provides a list of modules that can be utilized to grab all the credentials and hash dump of a compromised system with valid username ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required