Part 1 Lab: Local Operating System Exploitation
Complete the lab “Local Operating System Exploitation” in the InfoSec Learning (ISL) environment located in Unit 3. Completion is automatically graded and posted to the Gradebook entry for the lab.
Part 2 Assignment: Written Portion Requirements
Using the information discovered in the lab, discuss the following:
Detail the steps a malicious user would take to use fgdump to capture the passwords on a system.
Detail how any user can “look-up” a password, given a hash of a password and a password look-up site.
The written portion must contain sufficient information to adequately address the questions and be free from grammar and spelling errors.