Ładowanie...
Ebooki Bezpieczeństwo systemówSzczegóły ebooka: Ethical Password Cracking. Decode passwords using...
Szczegóły ebooka
Zaloguj się, jeśli jesteś zainteresowany treścią pozycji.
Ethical Password Cracking. Decode passwords using John the Ripper, hashcat, and advanced methods for password breaking
James Leyte-Vidal
Ładowanie...
EBOOK
Ładowanie...
Whether you’re looking to crack passwords as part of a thorough security audit or aiming to recover vital information, this book will equip you with the skills to accomplish your goals. Written by a cybersecurity expert with over fifteen years of experience in penetration testing, Ethical Password Cracking offers a thorough understanding of password protection and the correct approach to retrieving password-protected data.
As you progress through the chapters, you first familiarize yourself with how credentials are stored, delving briefly into the math behind password cracking. Then, the book will take you through various tools and techniques to help you recover desired passwords before focusing on common cracking use cases, hash recovery, and cracking. Real-life examples will prompt you to explore brute-force versus dictionary-based approaches and teach you how to apply them to various types of credential storage.
By the end of this book, you'll understand how passwords are protected and how to crack the most common credential types with ease.
As you progress through the chapters, you first familiarize yourself with how credentials are stored, delving briefly into the math behind password cracking. Then, the book will take you through various tools and techniques to help you recover desired passwords before focusing on common cracking use cases, hash recovery, and cracking. Real-life examples will prompt you to explore brute-force versus dictionary-based approaches and teach you how to apply them to various types of credential storage.
By the end of this book, you'll understand how passwords are protected and how to crack the most common credential types with ease.
- 1. Password Storage: Math, Probability, and Complexity
- 2. Why Crack When OSINT Will Do?
- 3. Setting Up Your Password Cracking Environment
- 4. John and Hashcat Rules
- 5. Windows and macOS Password Cracking
- 6. Linux Password Cracking
- 7. WPA/WPA2 Wireless Password Cracking
- 8. WordPress, Drupal, and Webmin Password Cracking
- 9. Password Vault Cracking
- 10. Cryptocurrency Wallet Passphrase Cracking
- 11. Protections against Password Cracking Attacks
- Tytuł:Ethical Password Cracking. Decode passwords using John the Ripper, hashcat, and advanced methods for password breaking
- Autor:James Leyte-Vidal
- Tytuł oryginału:Ethical Password Cracking. Decode passwords using John the Ripper, hashcat, and advanced methods for password breaking
- ISBN:9781804613856, 9781804613856
- Data wydania:2024-06-28
- Format:Ebook
- Identyfikator pozycji: e_3y01
- Wydawca: Packt Publishing
Ładowanie...
Ładowanie...