
Password Cracking with Kali Linux
Unlock Windows Security with Kali Linux Expertise
- 213 pages
- English
- ePUB (mobile friendly)
- Available on iOS & Android
Password Cracking with Kali Linux
Unlock Windows Security with Kali Linux Expertise
About this book
Unlock password security secrets with our Kali Linux course, exploring cracking techniques and defenses to boost your ethical hacking skills
Key Features
- Explore Windows security fundamentals for ethical hacking
- Dive into ethical hacking tools and techniques with Kali Linux
- Learn defense strategies to secure Windows systems effectively
Book Description
Unlock the secrets of Windows password security with "Password Cracking with Kali Linux, " your essential guide to navigating password-cracking techniques. This book offers a comprehensive introduction to Windows security fundamentals, arming you with the knowledge and tools for effective ethical hacking.The course begins with a foundational understanding of password security, covering prerequisites, lab setup, and an overview of the journey ahead. You'll explore Kerberoasting, tools like Rubeus, Mimikatz, and various attack methods, providing a solid base for understanding password vulnerabilities.The course focuses on practical applications of password cracking, including wordlist generation using tools like Crunch and Hashcat, and exploring various attack strategies. You'll delve into John the Ripper and Hashcat functionalities, learning to identify hash types and crack complex passwords efficiently.The course wraps up with advanced techniques in Linux password cracking and defense strategies. You'll gain insights into creating leaderboards, achievements, and monetizing games, equipping you with skills to not just crack passwords but also secure systems effectively.
What you will learn
- Understand Kerberoasting and its tools
- Crack complex passwords using Hashcat
- Explore John the Ripper's functionalities
- Utilize Unity Ads for game monetization
- Create leaderboards and social elements
- Develop proficiency in Unity C# scripting
Who this book is for
This course is ideal for cybersecurity enthusiasts, IT professionals, and ethical hackers. Basic knowledge of Kali Linux and password security principles is recommended. This course is tailored for those aiming to excel in cybersecurity and ethical hacking.
]]>
Trusted by 375,005 students
Access to over 1 million titles for a fair monthly price.
Study more efficiently using our study tools.
Information
Table of contents
- Password Cracking with Kali Linux
- Dedication
- About the Author
- Thank You
- Contents
- Chapter 1
- Pre-requisites and Scope
- Lab Setup
- Ethical Hacking Issues
- Disclaimer
- What we will Cover in our Journey
- Chapter 2
- Kerberoasting
- Key Components of Kerberoasting
- Attacking Kerberos
- Kerberos Attack Tools
- Rubeus
- Kerberoast Toolkit
- Mimikatz
- Mimikatz Pass the Hash Attacks
- Chapter 3
- Password Risks and Attacks
- Wordlists
- Commonly Used Wordlists
- Wordlists for Directory Path or Server Brute Forcing
- Wordlists Included with Kali
- Wordlist Generator Tools
- CeWL
- Crunch
- Crunch - Using the Charset.lst File
- Crunch: Creating Unicode Wordlists
- Crunch - Creating More Advanced Wordlists
- WARNING: This can Fill a Hard Drive Fast – Ye Have Been Warned
- Hashcat - Creating Wordlists with Hashcat
- Hashcat Utils
- Hashcat Keymap Walking Password Wordlists
- Introduction
- Installing KwProcessor (kwp)
- Keymaps and Routes
- Creating a KWP Wordlist
- Foreign Language Keywalks
- Wordlist Wrap-up
- Chapter 4
- Not sure what Kind of Hash you have?
- Cracking Simple LM Hashes
- Cracking LM/ NTLM Password Hashes Online
- Chapter 5
- Introduction to Password Cracking Tools
- John the Ripper
- John the Ripper Overview
- John the Ripper in Action
- Chapter 6
- Hashcat Attack Types
- Single Wordlist
- Single Wordlist with Rules
- Combining Two Wordlists
- Masks, Brute Force and Hybrid Attacks
- Masks
- Basic Brute Force Attacks
- Hybrid Attacks – Wordlists and Brute Force Together
- Cracking NTLM passwords
- Cracking harder passwords
- Using a Larger Dictionary File
- Chapter 7
- Rules and Mask Files
- Prince Processor Attack
- Password Cracking - Patterns
- Using Cracked Passwords to Crack New Passwords
- PACK - Password Analysis and Cracking Kit
- Chapter 8
- Obtaining Linux Passwords
- Automating Password Attacks with Hydra
- Automating Password Attacks with Medusa
- Automating Password Attacks with Ncrack
- Chapter 9
- Utilman Login Bypass
- Recovering Passwords from a Locked Workstation
- Keyscan, Lockout Keylogger, and Step Recorder
- Keylogging with Metasploit
- Chapter 10
- Regularly Rotate Service Account Passwords
- Implement Strong Password Policies
- Use Managed Service Accounts (MSAs) or Group Managed Service Accounts (gMSAs)
- Limit Service Account Privileges
- Monitor for Unusual Activity
- Implement Kerberos Armoring
- Enable Kerberos Ticket Lifetime Policies
- Monitor and Protect the KRBTGT Account
- Implement Credential Guard
- Use Extended Protection for Authentication
- Regularly Update and Patch Systems
- Educate Users and Administrators
- Consider Network Segmentation
- Bonus Chapter
- Install VMware Player & Kali Linux
- Kali Linux - Setting the IP address
- Kali Linux - Updating
- Installing Metasploitable 2
- Metasploitable 2 - Setting the IP Address
- Windows 11 - Installing as a Virtual Machine
- Optional VMs
- OWASP Mutillidae 2
- Installing Mutillidae on Ubuntu
- Damn Vulnerable Web Application (DVWA)
- Installing DVWA
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app