Professional Documents
Culture Documents
01 14-October-2023
MODULE OVERVIEW
application.
● To develop and implement effective screenshot using green shot and
flameshot application.
● To learn the fundamental concepts of IP addresses.
● To learn the fundamental concepts of MAC address.
Blockchain Technology
1) Kerberoasting
Kerberoasting attacks focus on service accounts
within Active Directory by leveraging the
ServicePrincipalName (SPN) property on user
objects. Service providers register their Service
Principal Names (SPNs) with Active Directory
(AD) objects during the authentication process.
Malicious actors may attempt to compromise
these service accounts and modify the SPN
2) Password Spraying
This is the method in which the attacker use a
catalog of previously obtained passwords and
their corresponding hashes to forcefully gain
unauthorized access to an account. Given that
the majority of authentication systems use a
lockout mechanism that blocks users after
repeated unsuccessful login attempts, the
attacker would systematically attempt various
combinations of usernames until they discover a
successful match. It is advisable to ensure that
staff utilize intricate passwords and, if feasible,
adopt multi-factor authentication to thwart
password spraying assaults. An effective
approach to identifying abnormal login attempts
is to implement a solution that includes a list of
previously hacked passwords and their
corresponding hashes.
3) Local Loop Multicast Name Resolution (LLMNR)
Local Loop Multicast Name Resolution (LLMNR) is a
networking feature in Windows that poses a security
threat to Active Directory. LLMNR enables name
resolution without the need for a DNS server.
Multicast packets are disseminated around the
network, requesting the IP address associated with a
specific hostname. Adversaries have the capability
to intercept these packets and assert that the IP
address is associated with their hostname. This
functionality is redundant if the Domain Name System
(DNS) is correctly setup. Therefore, the most
effective approach to address this danger would be to
completely deactivate LLMNR.
4) Pass-the-hash with Mimikatz
Pass-the-hash is a method employed to illicitly acquire login
credentials from Active Directory and enables the unauthorized
traversal within the system. Mimikatz is a program utilized by
attackers to exploit the NTLM authentication protocol. This tool
enables them to mimic a user and extract credential hashes
from the computer's memory. Organizations must take
measures to prevent the storage of privileged account hashes
o These typically last 32-40 hours, though they can run a lot longer.
Report Writing
o A report is typically delivered within a week after the engagements ends
o Report should highlight both non-technical and technical findings.
o Recommendations should be clear to both executives and technical staff.
Debrief
o A debrief walks through your report findings. This can be with technical and non-
technical staff present.
o It gives and opportunity for the client to ask questions and address any concern
before a final report is released.
EFFECTIVE NOTEKEEPING
FLAMESHOT - is a free
and open-source, cross-
platform tool to take
screenshots with many
built-in features to save
you time.
IP ADDRESS
a unique address that identifies a device on the internet or a local network. IP
stands for "Internet Protocol," which is the set of rules governing the format of data
sent via the internet or local network.[8]
is a string of numbers separated by periods. IP addresses are expressed as a set
of four numbers — an example address might be 192.158.1.38. Each number in the
set can range from 0 to 255.
IPV4
are 32-bit integers which will be expressed in decimal notation. [10]
IPV6
is a newer version of the internet protocol with longer addresses containing both
numbers and letters.[11]
MAC Address
is a 12-digit hexadecimal number that is most often displayed with a colon or
hyphen separating every two digits (an octet), making it easier to read.[12]
SUMMARY
In conclusion, ethical hacking, also known as penetration testing or white-hat hacking, plays
a crucial role in enhancing cybersecurity. By simulating potential cyber threats and
vulnerabilities, ethical hackers help organizations identify and remediate security
weaknesses before malicious actors can exploit them. By maintaining well-structured notes
and efficiently capturing and organizing screenshots, individuals can streamline information
retrieval, improve task management, and boost overall efficiency. Ip Adress is a unique
address that identifies a device on the internet or a local network. IP stands for "Internet
Protocol," which is the set of rules governing the format of data sent via the internet or local
network. MAC Address 12-digit hexadecimal number that is most often displayed with
a colon or hypen separating every two digits (an octet),
REFERENCES
[1]
Robinson, P. (2023, July 26). Top 10 active directory attack Methods. LepideBlog: A Guide to IT Security,
Compliance and IT Operations. https://www.lepide.com/blog/top-10-active-directory-attack-methods/
#:~:text=Most%20Common%20Active%20Directory%20Attack%20Methods%201%201.,. . .
%208%208.%20LDAP%20Reconnaissance%20. . .%20More%20items
[2]
OWASP Top 10:2021. (n.d.). https://owasp.org/Top10/
[3]
Shaikh, F. (2023, February 15). How To Take Notes in Notion [Complete Guide]. notionzen.
https://notionzen.com/how-to-take-notes-in-notion/
[4]
KeepNote: Note taking and organization. (n.d.). http://keepnote.org/
[5]
Joplin website. (n.d.). https://joplinapp.org/
[6]
Wikipedia contributors. (2023). Obsidian (software). Wikipedia.
https://en.wikipedia.org/wiki/Obsidian_(software)
[7]
Wikipedia contributors. (2023a). Greenshot. Wikipedia. https://en.wikipedia.org/wiki/Greenshot
[8]
What is an IP Address – Definition and Explanation. (2023, June 30). www.kaspersky.com.
https://www.kaspersky.com/resource-center/definitions/what-is-an-ip-address
[9]
private ip address - Bing. (n.d.). Bing. https://www.bing.com/images/search?view=detailV2&ccid=VU
%2b6FIc8&id=EA939991C7FA6A96BB9208675CEEC99C6DEB1FC3&thid=OIP.VU-6FIc8FDU-
4uwxlp5-tAHaFj&mediaurl=https%3a%2f%2fth.bing.com%2fth%2fid
%2fR.554fba14873c14353ee2ec31969e7eb4%3frik%3dwx%252frbZzJ7lxnCA%26riu%3dhttp%253a
%252f%252f66.media.tumblr.com%252f02a533c1d55ca0ba83e0176168df06ec
%252ftumblr_inline_o4m1taQugo1u4ytoo_1280.jpg%26ehk
%3d7xqOVMVX0UiRQR7xSKFy42mnjzJnbU3ScUM3A6GiPog%253d%26risl%3d%26pid
%3dImgRaw%26r
%3d0&exph=720&expw=960&q=private+ip+address&simid=608047570171408244&FORM=IRPRST
&ck=BE80175D7375A4107978B576B0F396AE&selectedIndex=0&ajaxhist=0&ajaxserp=0
[10]
GeeksforGeeks. (2022). What is IPv4. GeeksforGeeks. https://www.geeksforgeeks.org/what-is-ipv4/
[11]
Bogna, J. (2023). IPv4 vs. IPv6: What Are the Differences? How-To Geek.
https://www.howtogeek.com/901201/ipv4-vs-ipv6/
[12]
What’s a MAC Address and how do I find it? (n.d.). https://slts.osu.edu/articles/whats-a-mac-address-and-
how-do-i-find-it/