Table of Contents
- A Journey into Attacking Password Security
- Obtaining Password Hashes for Cracking
- Wordlists
- Determining Hash Type & Cracking Simple Passwords
- John the Ripper
- Hashcat
- More Advanced Techniques
- Cracking Linux Passwords
- Utilman & Keylogging – Other Password Recovery Options
- Defending Against Windows Password Attacks
- Bonus Chapter – Lab Setup and Installing VMs

