Book Image

Password Cracking with Kali Linux

By : Daniel W. Dieterle
Book Image

Password Cracking with Kali Linux

By: Daniel W. Dieterle

Overview of this book

Unlock the secrets of Windows password security with "Password Cracking with Kali Linux," your essential guide to navigating password-cracking techniques. This book offers a comprehensive introduction to Windows security fundamentals, arming you with the knowledge and tools for effective ethical hacking. The course begins with a foundational understanding of password security, covering prerequisites, lab setup, and an overview of the journey ahead. You'll explore Kerberoasting, tools like Rubeus, Mimikatz, and various attack methods, providing a solid base for understanding password vulnerabilities. The course focuses on practical applications of password cracking, including wordlist generation using tools like Crunch and Hashcat, and exploring various attack strategies. You'll delve into John the Ripper and Hashcat functionalities, learning to identify hash types and crack complex passwords efficiently. The course wraps up with advanced techniques in Linux password cracking and defense strategies. You'll gain insights into creating leaderboards, achievements, and monetizing games, equipping you with skills to not just crack passwords but also secure systems effectively.
Table of Contents (15 chapters)
Free Chapter
1
Password Cracking with Kali Linux
2
Dedication
3
About the Author
4
Thank You
5
Contents
Chapter 9
Utilman & Keylogging - Other Password Recovery Options
We have looked at several ways to grab passwords and crack them. In this bonus chapter I just wanted to cover some other possible ways that you could recover passwords from a system. This chapter isn’t really about password cracking, just some interesting ways that I have used to pull passwords or bypassed passwords in the past. If it is too technical, just read along or jump ahead to the next one, some of the techniques are very interesting. We will see how you could grab passwords or access systems during physical attacks, an attack where the security tester has physical access to a system. Then look at a couple more “untraditional” ways to recover passwords from a system. For ages the security field mantra has been, if you have physical access, you have total access. And in many cases, this is true. I performed onsite server and workstation support throughout upstate New York and Northern Pennsylvania...