Posts

Image
 My Presentation I have shared with you only  Sir,  If  unable kindly click on the link below   https://picits-my.sharepoint.com/:v:/g/personal/sihle_ntshotsho_pic_gov_za/Eb63fZ_T2CFGq2ecJqVR7-YBJIz3sn3GTPa5wr71unSY7w?email=miftikhar%40csu.edu.au&e=1jaEao
 AUTOMATED  BIBLIOGRAPHY AND JOURNAL SYNOPSIS CHARLES STURT UNIVERSITYITY   ITC571–EMERGING TECHNOLOGIES AND INNOVATIONTIMOTHY     SIHLE NTSHOTSHO:    Assignment Item 3:      Annotated Bibliography and Journal Synopsis   Article:1                 Walker, D. (2021). The top 12 password-cracking techniques used by hackers. Retrieved from Retrieved from https://www.itpro.co.uk/security/34616/the-top-password-cracking-techniques-used-by-hacke r s This article discusses the dated technique of computer user authentication and points out flaws and ways in which passwords can be compromised. It also points out how a leaked password became one of the biggest cybersecurity compromises referring to the SolarWinds compromise which at the center was a weak and easy to guess password. Holding true to the above statement of weak passwords, studies also back the assert...
Image
PROJECT PLAN    CHARLES STURT UNIVERSITY   ITC571: EMERGING TECHNOLOGY AND INNOVATION   ASSESSMENT ITEM 2: PROJECT PROPOSAL AND PLAN   STUDENT NAME: SIHLE NTSHOTSHO         Project Title: PASSWORD AS THE FORM OF AUTHENTICATION WILL SOON BECOME ABOSLETE Blog page: https://sihleitc571.blogspot.com/2021/08/     Rational • Problem Domain Traditional use of username and passwords as a form of information systems authentication fall short to thwart user account and system accounts compromise. This research will explore technologies available to harden information systems and make them more resilient again possible compromise of information and system abuse.   Purpose and justification Traditional information systems make use of usernames and passwords for system authentication, which may no longer be effective as there is substantial annual growth in computing power and the availability of free ...
Image
Dumping Hash Files  It is very common during penetration tests where domain administrator access has been achieved to extract the password hashes of all the domain users for offline cracking and analysis. These hashes are stored in a database file in the domain controller (NTDS.DIT) with some additional information like group memberships and users. The NTDS.DIT file is constantly in use by the operating system and therefore cannot be copied directly to another location for extraction of information. This file can be found in the following Windows location: 1 C:\Windows\NTDS\NTDS.dit There are various techniques that can be used to extract this file or the information that is stored inside it however the majority of them are using one of these methods: Domain Controller Replication Services Native Windows Binaries WMI Mimikatz Mimikatz has a feature (dcsync) which utilises the Directory Replication Service (DRS) to retrieve the password hashe...