Password Cracking with Kali Linux
eBook - ePub

Password Cracking with Kali Linux

Unlock Windows Security with Kali Linux Expertise

  1. 213 pages
  2. English
  3. ePUB (mobile friendly)
  4. Available on iOS & Android
eBook - ePub

Password Cracking with Kali Linux

Unlock Windows Security with Kali Linux Expertise

About this book

Unlock password security secrets with our Kali Linux course, exploring cracking techniques and defenses to boost your ethical hacking skills

Key Features

  • Explore Windows security fundamentals for ethical hacking
  • Dive into ethical hacking tools and techniques with Kali Linux
  • Learn defense strategies to secure Windows systems effectively

Book Description

Unlock the secrets of Windows password security with "Password Cracking with Kali Linux, " your essential guide to navigating password-cracking techniques. This book offers a comprehensive introduction to Windows security fundamentals, arming you with the knowledge and tools for effective ethical hacking.The course begins with a foundational understanding of password security, covering prerequisites, lab setup, and an overview of the journey ahead. You'll explore Kerberoasting, tools like Rubeus, Mimikatz, and various attack methods, providing a solid base for understanding password vulnerabilities.The course focuses on practical applications of password cracking, including wordlist generation using tools like Crunch and Hashcat, and exploring various attack strategies. You'll delve into John the Ripper and Hashcat functionalities, learning to identify hash types and crack complex passwords efficiently.The course wraps up with advanced techniques in Linux password cracking and defense strategies. You'll gain insights into creating leaderboards, achievements, and monetizing games, equipping you with skills to not just crack passwords but also secure systems effectively.

What you will learn

  • Understand Kerberoasting and its tools
  • Crack complex passwords using Hashcat
  • Explore John the Ripper's functionalities
  • Utilize Unity Ads for game monetization
  • Create leaderboards and social elements
  • Develop proficiency in Unity C# scripting

Who this book is for

This course is ideal for cybersecurity enthusiasts, IT professionals, and ethical hackers. Basic knowledge of Kali Linux and password security principles is recommended. This course is tailored for those aiming to excel in cybersecurity and ethical hacking.

]]>

Trusted by 375,005 students

Access to over 1 million titles for a fair monthly price.

Study more efficiently using our study tools.

Table of contents

  1. Password Cracking with Kali Linux
  2. Dedication
  3. About the Author
  4. Thank You
  5. Contents
  6. Chapter 1
  7. Pre-requisites and Scope
  8. Lab Setup
  9. Ethical Hacking Issues
  10. Disclaimer
  11. What we will Cover in our Journey
  12. Chapter 2
  13. Kerberoasting
  14. Key Components of Kerberoasting
  15. Attacking Kerberos
  16. Kerberos Attack Tools
  17. Rubeus
  18. Kerberoast Toolkit
  19. Mimikatz
  20. Mimikatz Pass the Hash Attacks
  21. Chapter 3
  22. Password Risks and Attacks
  23. Wordlists
  24. Commonly Used Wordlists
  25. Wordlists for Directory Path or Server Brute Forcing
  26. Wordlists Included with Kali
  27. Wordlist Generator Tools
  28. CeWL
  29. Crunch
  30. Crunch - Using the Charset.lst File
  31. Crunch: Creating Unicode Wordlists
  32. Crunch - Creating More Advanced Wordlists
  33. WARNING: This can Fill a Hard Drive Fast – Ye Have Been Warned
  34. Hashcat - Creating Wordlists with Hashcat
  35. Hashcat Utils
  36. Hashcat Keymap Walking Password Wordlists
  37. Introduction
  38. Installing KwProcessor (kwp)
  39. Keymaps and Routes
  40. Creating a KWP Wordlist
  41. Foreign Language Keywalks
  42. Wordlist Wrap-up
  43. Chapter 4
  44. Not sure what Kind of Hash you have?
  45. Cracking Simple LM Hashes
  46. Cracking LM/ NTLM Password Hashes Online
  47. Chapter 5
  48. Introduction to Password Cracking Tools
  49. John the Ripper
  50. John the Ripper Overview
  51. John the Ripper in Action
  52. Chapter 6
  53. Hashcat Attack Types
  54. Single Wordlist
  55. Single Wordlist with Rules
  56. Combining Two Wordlists
  57. Masks, Brute Force and Hybrid Attacks
  58. Masks
  59. Basic Brute Force Attacks
  60. Hybrid Attacks – Wordlists and Brute Force Together
  61. Cracking NTLM passwords
  62. Cracking harder passwords
  63. Using a Larger Dictionary File
  64. Chapter 7
  65. Rules and Mask Files
  66. Prince Processor Attack
  67. Password Cracking - Patterns
  68. Using Cracked Passwords to Crack New Passwords
  69. PACK - Password Analysis and Cracking Kit 
  70. Chapter 8
  71. Obtaining Linux Passwords
  72. Automating Password Attacks with Hydra
  73. Automating Password Attacks with Medusa
  74. Automating Password Attacks with Ncrack
  75. Chapter 9
  76. Utilman Login Bypass
  77. Recovering Passwords from a Locked Workstation
  78. Keyscan, Lockout Keylogger, and Step Recorder
  79. Keylogging with Metasploit
  80. Chapter 10
  81. Regularly Rotate Service Account Passwords
  82. Implement Strong Password Policies
  83. Use Managed Service Accounts (MSAs) or Group Managed Service Accounts (gMSAs)
  84. Limit Service Account Privileges
  85. Monitor for Unusual Activity
  86. Implement Kerberos Armoring
  87. Enable Kerberos Ticket Lifetime Policies
  88. Monitor and Protect the KRBTGT Account
  89. Implement Credential Guard
  90. Use Extended Protection for Authentication
  91. Regularly Update and Patch Systems
  92. Educate Users and Administrators
  93. Consider Network Segmentation
  94. Bonus Chapter
  95. Install VMware Player & Kali Linux
  96. Kali Linux - Setting the IP address
  97. Kali Linux - Updating
  98. Installing Metasploitable 2
  99. Metasploitable 2 - Setting the IP Address
  100. Windows 11 - Installing as a Virtual Machine
  101. Optional VMs
  102. OWASP Mutillidae 2
  103. Installing Mutillidae on Ubuntu
  104. Damn Vulnerable Web Application (DVWA)
  105. Installing DVWA

Frequently asked questions

Yes, you can cancel anytime from the Subscription tab in your account settings on the Perlego website. Your subscription will stay active until the end of your current billing period. Learn how to cancel your subscription
No, books cannot be downloaded as external files, such as PDFs, for use outside of Perlego. However, you can download books within the Perlego app for offline reading on mobile or tablet. Learn how to download books offline
Perlego offers two plans: Essential and Complete
  • Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
  • Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Both plans are available with monthly, semester, or annual billing cycles.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 990+ topics, we’ve got you covered! Learn about our mission
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more about Read Aloud
Yes! You can use the Perlego app on both iOS and Android devices to read anytime, anywhere — even offline. Perfect for commutes or when you’re on the go.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app
Yes, you can access Password Cracking with Kali Linux by Daniel W. Dieterle in PDF and/or ePUB format, as well as other popular books in Computer Science & System Administration. We have over one million books available in our catalogue for you to explore.