Discover tools and techniques to crack password hashes and use those hashes to gain unauthorized access to systems.
CEHv10: Password Attacks Part 2
- use popular password cracking tools like John the Ripper and Hashcat to crack passwords
- use GUI based password cracking tools like Ophcrack and gather password hashes for later cracking
- use man-in-the-middle attacks and pass-the-hash to gain access without cracking the password hash