Introduction
John The Ripper
Remote Password Attacks
Network Services
Password Mutations
Password Reuse/Default Passwords
Windows Local Password Attacks
Attacking SAM
Attacking LSASS
Attacking Active Directory & NTDS.dit
Credential Hunting in Windows
Attacking Windows Credential Manager
Linux Local Password Attacks
Credential Hunting in Linux
Passwd, Shadow & Opasswd
Lateral Movement
Pass the Hash (PtH)
Pass the Ticket (PtT) from Windows
Pass the Ticket (PtT) from Linux
Cracking Files