Introduction

John The Ripper

Remote Password Attacks

Network Services

Password Mutations

Password Reuse/Default Passwords

Windows Local Password Attacks

Attacking SAM

Attacking LSASS

Attacking Active Directory & NTDS.dit

Credential Hunting in Windows

Attacking Windows Credential Manager

Linux Local Password Attacks

Credential Hunting in Linux

Passwd, Shadow & Opasswd

Lateral Movement

Pass the Hash (PtH)

Pass the Ticket (PtT) from Windows

Pass the Ticket (PtT) from Linux

Cracking Files