Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Coursera

Ethical Password Cracking

Packt via Coursera

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
In this course, you will delve into the world of password cracking and security, learning essential techniques used by cybersecurity professionals. With tools like John the Ripper and Hashcat, you’ll gain hands-on experience in breaking password protections and understanding password vulnerabilities. This skill is critical in identifying security flaws and strengthening your defenses in a professional setting. Through a series of lessons, you will explore the core concepts of password security, from credential storage to common cracking techniques. The course equips you with the knowledge to assess system vulnerabilities and protect against unauthorized access. You will gain practical experience setting up a secure, multi-platform password-cracking environment, and learn ethical considerations in this high-stakes domain. What sets this course apart is its combination of theoretical knowledge with real-world application. You'll be given the chance to use industry-leading tools to solve practical password challenges, ensuring you gain both theoretical insights and hands-on expertise in ethical hacking. This course is tailored for cybersecurity professionals, ethical hackers, and penetration testers who wish to broaden their skill set. A basic understanding of Linux and Windows operating systems is recommended, making it ideal for those who already have an interest in ethical hacking and penetration testing.

Syllabus

  • Password Storage: Math, Probability, and Complexity
    • This section covers password-cracking methods, storage techniques, and security risks. Learn how to protect systems from unauthorized access.
  • Why Crack When OSINT Will Do
    • In this section, we explore how OSINT aids password cracking by identifying compromised credentials and generating password candidates from public data sources.
  • Setting Up Your Password Cracking Environment
    • In this section, we install and configure John the Ripper and hashcat for password cracking, emphasizing their roles in credential recovery and the use of wordlists for effective attacks.
  • John and Hashcat Rules
    • In this section, we explore how to enhance password cracking efficiency using rules. Key concepts include analyzing complexity, applying John and hashcat rules for improved credential recovery.
  • Windows and macOS Password Cracking
    • This section covers password hash collection and cracking on Windows and macOS for security assessments.
  • Linux Password Cracking
    • In this section, we explore techniques for collecting, formatting, and cracking Linux password hashes. Key concepts include secure handling of sensitive data and practical applications for system security assessments.
  • WPA/WPA2 Wireless Password Cracking
    • This section covers WPA/WPA2 architecture, capturing traffic, and cracking passphrases using aircrack-ng.
  • WordPress, Drupal, and Webmin Password Cracking
    • This section covers password hash collection and cracking for WordPress, Drupal, and Webmin.
  • Password Vault Cracking
    • This section covers methods to recover password vault passphrases using recovery kits and user clues.
  • Cryptocurrency Wallet Passphrase Cracking
    • This section covers passphrase cracking for cryptocurrency wallets, including Bitcoin, Litecoin, and Ethereum.
  • Protections Against Password Cracking Attacks
    • In this section, we explore methods to improve password security, including implementing policies, designing user guidelines, and analyzing hashing algorithms to resist cracking attacks.

Taught by

Packt - Course Instructors

Reviews

Start your review of Ethical Password Cracking

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.