Join Malcolm Shore for an in-depth discussion in this video Using the system functions, part of Penetration Testing Essential Training.
- [Instructor] Let's take a look…at one of the functions that we may find useful,…the crypt function.…This takes a password…and provides back its password hash.…On Linux systems,…we also use what's known as a salt value.…This is consistent for the system…but may differ between systems,…and it's a two-character value.…We'll use MS for this.…First of all,…I have to import the crypt library.…
From there I can call the crypt function…with a password and the salt,…and that returns the hash.…We can use this function in a small password cracker program…to recover a password by checking it…against a dictionary of expected passwords.…Let's also pass the hash as a parameter to the Python call.…We can do this by referring to the call argument value argv,…which is in the sys library.…I've got a dictionary called dict.txt…which I can read in.…
The dictionary file just contains potential passwords.…I've written a small password cracker…which uses the crypt function.…We can see here that we're opening the file dict.txt…and then reading each line…
Cybersecurity expert Malcolm Shore reviews popular pen testing tools, as well as the Bash and Python scripting skills required to be able to acquire, modify, and re-use exploit code. He also provides a refresher on Kali Linux and introduces techniques for testing web services. At the end of this course, you'll be prepared to take more advanced training, and to pursue the popular Offensive Security Certified Professional (OSCP) certification.
- Pen testing overview
- Pen testing tools
- Bash scripting
- Python scripting
- Kali and Metasploit
- Web testing
- Finding exploit code
Skill Level Intermediate
Ethical Hacking: Penetration Testingwith Lisa Bock1h 20m Intermediate
1. What is Pen Testing?
2. Pen Testing Tools
3. Bash Scripting
4. Python Scripting
5. Kali and Metasploit
6. Web Testing
7. Understanding Exploit code
What's next1m 27s
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.Cancel
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.