Videos

Published on July 11th, 2019 📆 | 7356 Views ⚑

0

Practical Pentesting – Extracting Sensitive Firmware Data – AttackDefense Labs


Powered by iSpeech


UDEMY discount for Python Basics (Course 1 in the Python Penetration Testers series): http://bit.ly/2Gfx8Qh
My courses Python for Penetration Testers: http://bit.ly/2xhSvM2 (message/email me for a substantial discount)

My laptop for pentesting video: https://www.youtube.com/watch?v=G4XG7mRceSs

Hire me as a penetration tester: https://dgtsec.com/penetration-testing-services/
101 Pentesting Training: https://dgtsec.com/cybersec-pentesting-training/
101 Cybersecurity Consulting: https://dgtsec.com/cybersec-pentesting-training/

It helps me tremendously if you support these educational videos:

https://www.patreon.com/cristivlad

Connect with me:

Linkedin: https://www.linkedin.com/in/cristivlad/
Twitter: https://twitter.com/CristiVlad25
Facebook page: https://www.facebook.com/CristiVladZ/
Facebook group: https://www.facebook.com/groups/cybersecpros/
Hackthebox: https://www.hackthebox.eu/profile/27034
Tryhackme: https://tryhackme.com/p/cristi





Books I recommend for Penetration Testing and Ethical Hacking:

1. TJ O'Connor - Violent Python: https://amzn.to/31vH2GB
2. Dafydd Stuttard - Web App Hacker' s Handbook (2nd Ed): https://amzn.to/2MRcjk3
3. Peter Yaworski - Web Hacking 101: https://amzn.to/2KTvJSy
4. Jon Erickson - Hacking: The Art of Exploitation (2nd Ed):
https://amzn.to/2WHr3BD
5. Peter Kim - The Hacker Playbook 3 (2018): https://amzn.to/2MQiTXK

My free Developing Ethical Hacking Tools with Python course on Cybrary: http://bit.ly/2J5USbC
__________

In this video I solve a challenge on https://attackdefense.com/. This challenge involves extracting sensitive information from a firmware bin file, the root password hash, and cracking that hash with hashcat.

Please make sure to do this type of engagement (penetration testing and/or cybersecurity assessment) only in safe and legal environments, and only with the appropriate permissions.


2019-07-11 15:58:44

source

Tagged with:



Comments are closed.