From manipulating network traffic to cracking user credentials, this course will give you the skills and understanding to further your red teaming objectives towards exploitation, credential access, and lateral movement.
Cain & Abel is a versatile tool for the Windows operating system which can help further your red teaming objectives with techniques ranging from manipulating network traffic to cracking passwords using brute force and cryptanalysis attacks.
In this course, Credential Access with Cain & Abel, you will gain the ability to access credential sets in a victim network.
First, you will learn to perform network reconnaissance from the Windows operating system. Next, you will discover how you can use a man-in-the-middle attack to access the credentials transmitted between victims on a network. Finally, you will explore how to remotely exploit a victim for harvested credentials which can then be cracked by the tool suite.
When you are finished with this course, you will have the skills and knowledge of Cain & Abel needed to access valid credential sets and move through a network during an attack engagement.
Course Overview Welcome to Pluralsight and this cyber security tools course featuring Cain and Abel, the free password recovery tool developed and maintained by Massimiliano Montoro. Cain and Abel is a tool which red teaming members who are looking to take advantage of valid credential sets to impersonate legitimate users and move laterally in a network can use during an attack engagement. Additionally, the tool can be used by penetration testers who wish to gain remote control to a system or harvest credentials, as well as forensic staff looking to recover passwords. Cain and Abel is a tool for the Windows operating system that enables the manipulation of network traffic to identify weak or plain text passwords. A vast array of encrypted credential types and hashes can also be compromised through brute‑force techniques and cryptanalysis attacks. Finally, remote access to vulnerable systems is possible with Abel, which provides a variety of commands against a system to be executed remotely. Cain and Abel consists of tooling that can be used for two separate objectives. Cain can be used for password cracking and network‑based activities, while Abel can be placed on a vulnerable system to enable remote access and execution of commands on the system. If you would like to learn how to use Cain and Abel to sniff your network, hunt for valid credential sets, and use those credentials to move laterally between systems, come join me and explore the versatility of Cain and Abel.