Description: This video is about some post exploit activity, those can be done on victim.
when exploit is successfully completed attacker gets a meterpreter session or shell. this video shows how to know the hashdump of victim machine, which can be further processed to john and ripper to audit the password. to find out the hashes from victim machine command "hashdump" is used in meterpreter session. then john is used to crack the hashes.
Tags: metasploit , exploit , hashdump ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.
john is very good tool for cracking hash. we can also use online service for different cracking.
http://www.onlinehashcrack.com/
This is very basic Tutorial but helpful thanks :)
Use hashcat for Ultimate fast speed cracking.