Description: This is Part 9 of the Security Metasploit Framework Expert (SMFE) course material. You can begin by watching Part 1 here: http://www.securitytube.net/video/2556 . Enjoy! Certifications page: http://www.securitytube.net/cert-list
In this video, we will look at what Windows tokens are and how a hacker can steal tokens to impersonate the identity of another user on either the local machine or network wide. We will explore the incognito extension to understand how to steal and use tokens on a compromised box in the post exploitation phase. This is a very important concept, so please pay attention :)
As always, your comments are well appreciated :)
Tags: smfe , metasploit , incognito , token stealing ,
Thanks Vivek for all this AWESOME videos. You're a great teacher, very inspirational.
I have a question for you: what are the differences between this SMFE course and the "old" metasploit megaprimer that you uploaded months ago?
Are they complementary or not?
I ask you this because I don't know how to proceed in order to get starting with metasploit.
Thanks in advance and greetings from Italy! :)
@Cotica Thanks! :)
The old Metasploit Megaprimer is now retired :) the framework has changed quite a lot and the SMFE course will follow all the updates. Also, SMFE will contain a lot more videos and details than the Megaprimer.
Hope my comments are not boring for you to read, and motivate you to make more videos :)
Nice :)
"vivek:i think u have 48h in a day !!!!!!!!
i really ask u to make a Expert series for ASM linux & win,and exploit in more details...or make primer to web app after SMFE series.
ur my hero vivek :) keep moving Forward !
(as always sorry for eng mistakes ;) )
The explanation is so nice and clean. I loved it. spread your knowledge as a real hacker.
your videos are great vivek.. can“t wait for the scenario-based videos :D
Dear sir,
your work is awesome, steal_token, drop_token are really very important commands. Your explanation for multiple user scenario is very good. One question in my mind is : can we steal a domain user privileges on windows server 2003 via this method. I am not tried this.
Zax: and I really think that you have 48 hours in a day.
Great JOB, Hats off only for you.
Hi, Vivek
Token manipulation " Amazing Stuff" :)
I would want to dump hashes for domain users logged in using meterpreter.
I have tried cachedump.rb which was not working.
Do you know a better way to do that!!
Thanks in advnc.
Rohit
@Against_Injustice:i studying Telecom Engineering and in my country the final exams has began!that's why i always Awake :D
but i cant leave this site :))
no comment,best metasploit video course (and it's FREE)
my respect VIVEK .
@revsec: best comment I have read on here :)
@vivek-Ramachandran: I should have my video updated by tomorrow :) thanks so much for everything.
@ringneckparrot Not at all my friend :) On the contrary interacting with viewers keeps me motivated :)
@zax I manage to get away with less sleep :) but yes, it has been demanding but fun! :) I love what I do :)
@shivagreyhat, 3IL060 thanks guys! :)
@Against_Injustice You could :) search for a video called "Hacking a domain" or something similar on ST, that shows you how to approach this.
@rm07en Running the post exploitation scripts should mostly work. However, do you have sufficient privileges? e.g. on a Win2008 you need to be running in the context of the System process to dump the hashes.
@revsec, j0k3rr Thanks my friend! :)
The next video on how to use Espia and Sniffer extensions is now available :)
http://www.securitytube.net/video/2683
hi vivek, Would like to ask whether when you run icognito token stealing and impersonation, do you need to be a system first? can i use this method to help escalate from a user to admin then to system?