Kali Linux

  1. The Kali Linux Toolkit: Password Attacks
    1. Password Attack Fundamentals
      1. Password Security Concepts
        1. Attack Methodologies
          1. Password Complexity Analysis
            1. Common Password Patterns
            2. Offline Password Attacks
              1. Hash Cracking Tools
                1. John the Ripper
                  1. Supported Hash Types
                    1. Wordlist Attacks
                      1. Rule-Based Attacks
                        1. Brute Force Attacks
                          1. Incremental Mode
                            1. Custom Rules Creation
                            2. Hashcat
                              1. GPU Acceleration
                                1. Attack Modes
                                  1. Hash Type Detection
                                    1. Mask Attacks
                                      1. Combinator Attacks
                                        1. Rule-Based Attacks
                                          1. Distributed Cracking
                                        2. Hash Extraction
                                          1. Windows Hash Extraction
                                            1. SAM Database
                                              1. NTDS.dit
                                                1. LSA Secrets
                                                2. Linux Hash Extraction
                                                  1. /etc/shadow
                                                    1. /etc/passwd
                                                    2. Application Hash Extraction
                                                  2. Online Password Attacks
                                                    1. Network Service Attacks
                                                      1. Hydra
                                                        1. Protocol Support
                                                          1. Parallel Attacks
                                                            1. Custom Modules
                                                              1. Proxy Support
                                                              2. Medusa
                                                                1. Modular Architecture
                                                                  1. Threading Options
                                                                    1. Resume Capabilities
                                                                    2. Ncrack
                                                                      1. Service Detection
                                                                        1. Timing Templates
                                                                      2. Web Application Attacks
                                                                        1. HTTP Form Attacks
                                                                          1. HTTP Basic Authentication
                                                                            1. HTTPS Attacks
                                                                            2. Database Password Attacks
                                                                              1. MySQL Brute Force
                                                                                1. PostgreSQL Brute Force
                                                                                  1. MSSQL Brute Force
                                                                                  2. Remote Desktop Attacks
                                                                                    1. RDP Brute Force
                                                                                      1. VNC Brute Force
                                                                                    2. Wordlist Generation and Management
                                                                                      1. Wordlist Creation Tools
                                                                                        1. Crunch
                                                                                          1. Pattern-Based Generation
                                                                                            1. Character Set Definition
                                                                                              1. Output Options
                                                                                              2. CeWL
                                                                                                1. Website Wordlist Generation
                                                                                                  1. Depth Control
                                                                                                    1. Email Extraction
                                                                                                    2. cupp
                                                                                                      1. Social Engineering Wordlists
                                                                                                        1. Personal Information Integration
                                                                                                      2. Wordlist Collections
                                                                                                        1. SecLists
                                                                                                          1. RockYou
                                                                                                            1. Custom Wordlist Creation
                                                                                                            2. Wordlist Optimization
                                                                                                              1. Duplicate Removal
                                                                                                                1. Sorting and Filtering
                                                                                                                  1. Statistical Analysis
                                                                                                                2. Advanced Password Attack Techniques
                                                                                                                  1. Rainbow Table Attacks
                                                                                                                    1. Rainbow Table Generation
                                                                                                                      1. RainbowCrack Usage
                                                                                                                        1. Time-Memory Trade-offs
                                                                                                                        2. Hybrid Attacks
                                                                                                                          1. Wordlist + Rules
                                                                                                                            1. Wordlist + Masks
                                                                                                                              1. Combinator Attacks
                                                                                                                              2. Distributed Password Cracking
                                                                                                                                1. Cluster Setup
                                                                                                                                  1. Work Distribution
                                                                                                                                    1. Result Aggregation
                                                                                                                                  2. Password Attack Countermeasures
                                                                                                                                    1. Account Lockout Policies
                                                                                                                                      1. Rate Limiting
                                                                                                                                        1. Multi-Factor Authentication
                                                                                                                                          1. Password Complexity Requirements