Post Exploitation With Windows Credentials Editor (WCE) - Dump Windows Password Hashes
HackerSploit
Hey guys! In this video, I will be demonstrating how to perform post exploitation with windows credentials editor (WCE), and how dump windows password hashes. This tool can be used, for example, to perform pass-the-hash on Windows, obtain NT/LM hashes from memory (from interactive logons, services, remote desktop connections, etc.), obtain Kerberos tickets and reuse them in other Windows or Unix systems and dump cleartext passwords entered by users at login.
Link: PowerShell Empire: https://github.com/EmpireProject/Empire
◼️Get Our Courses: Python For Ethical Hacking: https://www.udemy.com/python-for-ethical-hacking-develop-pentesting-tools/?couponCode=PFEHJUN
◼️Our Platforms: Hsploit: https://hsploit.com/ HackerSploit Forum: https://hackersploit.org/ HackerSploit Discord: https://discord.gg/j3dH7tK HackerSploit Podcast: https://soundcloud.com/hackersploit iTunes: https://itunes.apple.com/us/podcast/the-hackersploit-podcast/id1439732519?mt=2
◼️Support us by using the following links: NordVPN: https://nordvpn.org/hacker Patreon: http://patreon.com/hackersploit
I Hope you enjoy/enjoyed the video. If you have any questions or suggestions feel free to post them in the comments section or on my social networks.
Social Networks - Connect With Us!
Facebook: https://www.facebook.com/HackerSploit/ Twitter: https://twitter.com/HackerSploit Instagram: https://www.instagram.com/hackersploit/ Patreon: http://patreon.com/hackersploit
Thanks for watching! Благодаря за гледането Kiitos katsomisesta Danke fürs Zuschauen! 感谢您观看 Merci d'avoir regardé دیکھنے کے لیے شکریہ देखने के लिए धन्यवाद Grazie per la visione Gracias por ver شكرا للمشاهدة
#RedTeam#WCE ... https://www.youtube.com/watch?v=u0RppDmw1So
38836246 Bytes