00 — Overview

Credential Harvesting & Lateral Movement

Find credentials hidden across a compromised machine, crack hashes, reuse SSH keys, and move from one system to another — turning a single foothold into full network access.

Intermediate·55 min·6 tasks
// By the end of this module
Locate credentials in /etc/shadow, config files, and bash history
Extract and crack password hashes with Hashcat and John
Identify SSH key reuse across multiple hosts
Move laterally to a second host using harvested credentials
// Prerequisites
Complete these before starting this module for the best experience.