Overview
Explore the process of dumping and cracking NTLM hashes on Windows systems in this informative video tutorial. Learn how to execute Pass-The-Hash attacks using NTLM hashes, and gain insights into post-exploitation techniques. Access additional resources, including a TryHackMe room and the winPEAS tool, to enhance your understanding of Windows security vulnerabilities. Discover practical applications of these techniques in penetration testing and cybersecurity assessments.
Syllabus
Windows Post Exploitation - Dumping & Cracking NTLM Hashes
Taught by
HackerSploit