Core Impact Advanced Techniques | Password Attacks

In addition to exploitation capabilities, Core Impact also includes powerful attack and penetration techniques that can be used to collect passwords to use later on in engagements. This training video covers a few ways to conduct password attacks using Core Impact.

 

{"preview_thumbnail":"/sites/default/files/styles/video_embed_wysiwyg_preview/public/video_thumbnails/kcqym4aszd.jpg?itok=2GiNyJos","video_url":"https://linoma.wistia.com/medias/kcqym4aszd","settings":{"responsive":1,"width":"854","height":"480","autoplay":0},"settings_summary":["Embedded Video (Responsive)."]}