-
Book Overview & Buying
-
Table Of Contents
Kali Linux Cookbook - Third Edition
By :
In this chapter, you will learn how attackers compromise user credentials across various operating systems and services. You will see how passwords and other authentication mechanisms can be subverted through network interception, extraction of stored hashes, and systematic brute-force attempts. By walking through each approach, you’ll gain insight into the practical steps adversaries follow to break into local systems, remote hosts, and entire domains.
We will dive into a broad range of techniques, from leveraging password lists to crafting powerful mutation strategies and exploiting everyday habits such as password reuse. Whether the focus is on cracking archived files, intercepting network traffic, or performing shoulder-surfing in physical environments, this chapter emphasizes the methods and tools necessary to successfully compromise login credentials.
The following recipes will be covered in this chapter: