00 — Overview
Credential Harvesting & Lateral Movement
Find credentials hidden across a compromised machine, crack hashes, reuse SSH keys, and move from one system to another — turning a single foothold into full network access.
Intermediate·55 min·6 tasks
// By the end of this module
→Locate credentials in /etc/shadow, config files, and bash history
→Extract and crack password hashes with Hashcat and John
→Identify SSH key reuse across multiple hosts
→Move laterally to a second host using harvested credentials
// Prerequisites
Complete these before starting this module for the best experience.