What we will Cover in our Journey
In the first chapter, we will cover a basic introduction to the Windows foundational security authentication protocols Kerberos and NTLM. Both of these protocols create encrypted passkeys - tickets for Kerberos, and hashes for NTLM. For simplicity’s sake, I will call both of these “password hashes” throughout the book. We will then cover some of the popular tools and techniques used to obtain these hashes.
We then take an extensive look at wordlists. Wordlists are the foundation to password cracking. Using a good wordlist will greatly increase your chances and speed of password cracking. We will cover how to find, create or generate effectual wordlists for password cracking. This includes using tools to create custom wordlists. Then we will dive into the actual cracking tools. How Wordlists are used by cracking programs to unlock access. In the chapters ahead we will briefly cover John the Ripper and then...