دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش:
نویسندگان: James Leyte-Vidal
سری:
ISBN (شابک) : 1804611263, 9781804611265
ناشر: Packt Publishing
سال نشر: 2024
تعداد صفحات: 168
زبان: English
فرمت فایل : RAR (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود)
حجم فایل: 21 Mb
در صورت تبدیل فایل کتاب Ethical Password Cracking: Decode passwords using John the Ripper, hashcat, and advanced methods for password breaking به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب ترک خوردن رمز عبور اخلاقی: رمزهای عبور را با استفاده از John the Ripper ، Hashcat و روش های پیشرفته برای شکستن رمز عبور رمزگشایی کنید نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
Investigate how password protection works and delve into popular cracking techniques for penetration testing and retrieving data
Whether you’re looking to crack passwords as part of a thorough security audit or aiming to recover vital information, this book will equip you with the skills to accomplish your goals. Written by a cybersecurity expert with over fifteen years of experience in penetration testing, Ethical Password Cracking offers a thorough understanding of password protection and the correct approach to retrieving password-protected data.
As you progress through the chapters, you first familiarize yourself with how credentials are stored, delving briefly into the math behind password cracking. Then, the book will take you through various tools and techniques to help you recover desired passwords before focusing on common cracking use cases, hash recovery, and cracking. Real-life examples will prompt you to explore brute-force versus dictionary-based approaches and teach you how to apply them to various types of credential storage.
By the end of this book, you'll understand how passwords are protected and how to crack the most common credential types with ease.
This book is for cybersecurity professionals, penetration testers, and ethical hackers looking to deepen their understanding of password security and enhance their capabilities in password cracking. You’ll need basic knowledge of file and folder management, the capability to install applications, and a fundamental understanding of both Linux and Windows to get started.
Cover Title Page Copyright and Credits Contributors Table of Contents Preface Part 1: Introduction and Setup Chapter 1: Password Storage: Math, Probability, and Complexity What is password cracking? Dictionary-based attacks Combination attacks Brute-force attacks Hybrid attacks Partial knowledge, also known as mask attacks How are passwords stored and used? Hashing Encryption Why are some passwords easier to crack than others? Password length Password complexity Time to hash/encrypt the password A word on “ethical” password cracking Summary Chapter 2: Why Crack When OSINT Will Do? How does OSINT help with password cracking? Leveraging OSINT to access compromised passwords Using OSINT to obtain password candidates Summary Chapter 3: Setting Up Your Password Cracking Environment Technical requirements Installing and introducing John Core functions of John Installing hashcat Core functions of hashcat Summary Chapter 4: John and Hashcat Rules Analyzing password complexity rules Selecting and using John rules Selecting and using hashcat rules Summary Part 2: Collection and Cracking Chapter 5: Windows and macOS Password Cracking Collecting Windows password hashes Kerberos Cracking Windows hashes Collecting macOS password hashes Formatting/converting hashes into their expected formats Cracking hashes Summary Chapter 6: Linux Password Cracking Collecting Linux password hashes Formatting/converting hashes into their expected formats Cracking hashes Summary Chapter 7: WPA/WPA2 Wireless Password Cracking A note about WEP WPA/WPA2 architecture Obtaining WPA/WPA2 information to crack Methods for cracking WPA/WPA2 passphrases Chapter 8: WordPress, Drupal, and Webmin Password Cracking Collecting and formatting WordPress hashes Cracking WordPress hashes Collecting and formatting Drupal hashes Cracking Drupal hashes Collecting and formatting Webmin hashes Cracking Webmin hashes Summary Chapter 9: Password Vault Cracking Collecting KeePass password hashes Cracking KeePass password hashes Collecting LastPass password hashes Cracking LastPass hashes Collecting 1Password password hashes Cracking 1Password password hashes Summary Chapter 10: Cryptocurrency Wallet Passphrase Cracking Cryptocurrencies and blockchain explained Collecting and formatting Bitcoin/Litecoin wallet hashes Cracking Bitcoin/Litecoin wallet hashes Collecting and formatting Ethereum wallet hashes Cracking Ethereum wallet hashes Summary Part 3: Conclusion Chapter 11: Protections against Password Cracking Attacks How to choose a password more resistant to cracking attacks Additional protections against cracking attacks Summary Index Other Books You May Enjoy