7 hours 47 minutes

Video Description

This lesson focuses on timestamps, event log clearing and password cracking. A timestamp is a metadata field that informs a system about when a file was created, edited, opened or moved. You can defeat timestamps on a Windows machine by obfuscation, in Linux you can also use the touch command. Windows event logs can be used to store information about nearly everything on a system and are managed via the command line wevtutil. Participants also learn about two methods of password cracking: Brute force: trying every possible combination until something works. Dictionary attacks: using a list of words to crack password. This method can be highly effective as 98% of passwords are made up of the 10,000 most common passwords.

Up Next

Post Exploitation Hacking

In this self-paced online training course, you will cover three main topics: Information Gathering, Backdooring and Covering Steps, how to use system specific tools to get general information, listener shells, metasploit and meterpreter scripting.

Instructed By

Instructor Profile Image
Joe Perry
Senior Technical Instructor at FireEye, Inc