Book Image

Password Cracking with Kali Linux

By : Daniel W. Dieterle
Book Image

Password Cracking with Kali Linux

By: Daniel W. Dieterle

Overview of this book

Unlock the secrets of Windows password security with "Password Cracking with Kali Linux," your essential guide to navigating password-cracking techniques. This book offers a comprehensive introduction to Windows security fundamentals, arming you with the knowledge and tools for effective ethical hacking. The course begins with a foundational understanding of password security, covering prerequisites, lab setup, and an overview of the journey ahead. You'll explore Kerberoasting, tools like Rubeus, Mimikatz, and various attack methods, providing a solid base for understanding password vulnerabilities. The course focuses on practical applications of password cracking, including wordlist generation using tools like Crunch and Hashcat, and exploring various attack strategies. You'll delve into John the Ripper and Hashcat functionalities, learning to identify hash types and crack complex passwords efficiently. The course wraps up with advanced techniques in Linux password cracking and defense strategies. You'll gain insights into creating leaderboards, achievements, and monetizing games, equipping you with skills to not just crack passwords but also secure systems effectively.
Table of Contents (15 chapters)
Free Chapter
1
Password Cracking with Kali Linux
2
Dedication
3
About the Author
4
Thank You
5
Contents
Rubeus
Rubeus is a C# based tool for interacting and attacking Kerberos. The tool was originally based off of Benjamin Delpy’s (the creator of Mimikatz) Kekeo, but has since evolved into its own creation. Rubeus can be used in many, many different ways to attack Kerberos, we will only briefly look at one. I highly suggest the reader check out the tool’s Wiki for extensive documentation and usage information.
You will notice there is no executable download on the Rubeus GitHub page. You will need to compile the tool on your own. Obviously in its present form, it will be detected by most, if not all Anti-Virus systems and blocked right away. An experienced Red Team attacker would need to modify some of the code before compiling to avoid AV detection. 
Quick Kerberoasting Walkthrough
  1. Obtaining Initial Access
Before an attacker can use Rubeus, they...