🧑💼Insider Attack
Tools & Preparation
You should arrive prepared with everything you need to conduct your attack since you may not have an opportunity to download anything from the outside once you’re in.
Have all the tools you are likely to need with you on removable media such as a USB drive or CD.
In the most difficult cases, such as a fully locked CMOS
and full disk encryption, you may even want to bring a hard drive with a prepared operating system on it so that you can attempt to gain access to the subject network from
the provided equipment.
Orientation
The most common configuration you’ll encounter is the Windows workstation, a stand- alone PC or laptop computer running a version of Microsoft Windows. It will most likely be connected to a wired LAN and utilize the Windows domain login. You’ll be given a domain account. Log in and have a look around. Take some time to “browse” the network using the Windows file explorer. You may see several Windows domains as well as drives mapped to file servers, some of which you may already be connected to. The whole point of the insider attack is to find sensitive information, so keep your eyes open for servers with descriptive names such as “HR” or “Engineering.” Once you feel comfortable that you know the bounds of your account and have a general view of the network, it’s time to start elevating your privilege level.
Gaining Local Admin Privileges
Reset Admin Password Using Offline NT Password and Registry Editor
Copy SAM File to a USB
Recovering Admins Password
Bringing rainbow tables and software with you on a large USB hard drive
Using a dictionary attack with Cain or L0phtCrack
Taking the SAM file back to your office to crack overnight
Sending the SAM file to a member of your team on the outside
Last updated