ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Ethical Password Cracking: Decode passwords using John the Ripper, hashcat, and advanced methods for password breaking

دانلود کتاب ترک خوردن رمز عبور اخلاقی: رمزهای عبور را با استفاده از John the Ripper ، Hashcat و روش های پیشرفته برای شکستن رمز عبور رمزگشایی کنید

Ethical Password Cracking: Decode passwords using John the Ripper, hashcat, and advanced methods for password breaking

مشخصات کتاب

Ethical Password Cracking: Decode passwords using John the Ripper, hashcat, and advanced methods for password breaking

ویرایش:  
نویسندگان:   
سری:  
ISBN (شابک) : 1804611263, 9781804611265 
ناشر: Packt Publishing 
سال نشر: 2024 
تعداد صفحات: 168 
زبان: English 
فرمت فایل : RAR (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 21 Mb 

قیمت کتاب (تومان) : 30,000



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 4


در صورت تبدیل فایل کتاب Ethical Password Cracking: Decode passwords using John the Ripper, hashcat, and advanced methods for password breaking به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب ترک خوردن رمز عبور اخلاقی: رمزهای عبور را با استفاده از John the Ripper ، Hashcat و روش های پیشرفته برای شکستن رمز عبور رمزگشایی کنید نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی در مورد کتاب ترک خوردن رمز عبور اخلاقی: رمزهای عبور را با استفاده از John the Ripper ، Hashcat و روش های پیشرفته برای شکستن رمز عبور رمزگشایی کنید


توضیحاتی درمورد کتاب به خارجی

Investigate how password protection works and delve into popular cracking techniques for penetration testing and retrieving data

Key Features

  • Gain guidance for setting up a diverse password-cracking environment across multiple platforms
  • Explore tools such as John the Ripper, Hashcat, and techniques like dictionary and brute force attacks for breaking passwords
  • Discover real-world examples and scenarios to navigate password security challenges effectively
  • Purchase of the print or Kindle book includes a free PDF eBook

Book Description

Whether you’re looking to crack passwords as part of a thorough security audit or aiming to recover vital information, this book will equip you with the skills to accomplish your goals. Written by a cybersecurity expert with over fifteen years of experience in penetration testing, Ethical Password Cracking offers a thorough understanding of password protection and the correct approach to retrieving password-protected data.

As you progress through the chapters, you first familiarize yourself with how credentials are stored, delving briefly into the math behind password cracking. Then, the book will take you through various tools and techniques to help you recover desired passwords before focusing on common cracking use cases, hash recovery, and cracking. Real-life examples will prompt you to explore brute-force versus dictionary-based approaches and teach you how to apply them to various types of credential storage.

By the end of this book, you'll understand how passwords are protected and how to crack the most common credential types with ease.

What you will learn

  • Understand the concept of password cracking
  • Discover how OSINT potentially identifies passwords from breaches
  • Address how to crack common hash types effectively
  • Identify, extract, and crack Windows and macOS password hashes
  • Get up to speed with WPA/WPA2 architecture
  • Explore popular password managers such as KeePass, LastPass, and 1Password
  • Format hashes for Bitcoin, Litecoin, and Ethereum wallets, and crack them

Who this book is for

This book is for cybersecurity professionals, penetration testers, and ethical hackers looking to deepen their understanding of password security and enhance their capabilities in password cracking. You’ll need basic knowledge of file and folder management, the capability to install applications, and a fundamental understanding of both Linux and Windows to get started.

Table of Contents

  1. Password Storage: Math, Probability, and Complexity
  2. Why Crack When OSINT Will Do?
  3. Setting Up Your Password Cracking Environment
  4. John and Hashcat Rules
  5. Windows and macOS Password Cracking
  6. Linux Password Cracking
  7. WPA/WPA2 Wireless Password Cracking
  8. WordPress, Drupal, and Webmin Password Cracking
  9. Password Vault Cracking
  10. Cryptocurrency Wallet Passphrase Cracking
  11. Protections against Password Cracking Attacks


فهرست مطالب

Cover
Title Page
Copyright and Credits
Contributors
Table of Contents
Preface
Part 1: Introduction and Setup
Chapter 1: Password Storage: Math, Probability, and Complexity
	What is password cracking?
		Dictionary-based attacks
		Combination attacks
		Brute-force attacks
		Hybrid attacks
		Partial knowledge, also known as mask attacks
	How are passwords stored and used?
		Hashing
		Encryption
	Why are some passwords easier to crack than others?
		Password length
		Password complexity
		Time to hash/encrypt the password
	A word on “ethical” password cracking
	Summary
Chapter 2: Why Crack When OSINT Will Do?
	How does OSINT help with password cracking?
	Leveraging OSINT to access compromised passwords
	Using OSINT to obtain password candidates
	Summary
Chapter 3: Setting Up Your Password Cracking Environment
	Technical requirements
		Installing and introducing John
		Core functions of John
	Installing hashcat
		Core functions of hashcat
	Summary
Chapter 4: John and Hashcat Rules
	Analyzing password complexity rules
	Selecting and using John rules
	Selecting and using hashcat rules
	Summary
Part 2: Collection and Cracking
Chapter 5: Windows and macOS Password Cracking
	Collecting Windows password hashes
		Kerberos
	Cracking Windows hashes
	Collecting macOS password hashes
	Formatting/converting hashes into their expected formats
	Cracking hashes
	Summary
Chapter 6: Linux Password Cracking
	Collecting Linux password hashes
	Formatting/converting hashes into their expected formats
	Cracking hashes
	Summary
Chapter 7: WPA/WPA2 Wireless Password Cracking
	A note about WEP
	WPA/WPA2 architecture
	Obtaining WPA/WPA2 information to crack
	Methods for cracking WPA/WPA2 passphrases
Chapter 8: WordPress, Drupal, and Webmin Password Cracking
	Collecting and formatting WordPress hashes
	Cracking WordPress hashes
	Collecting and formatting Drupal hashes
	Cracking Drupal hashes
	Collecting and formatting Webmin hashes
	Cracking Webmin hashes
	Summary
Chapter 9: Password Vault Cracking
	Collecting KeePass password hashes
	Cracking KeePass password hashes
	Collecting LastPass password hashes
	Cracking LastPass hashes
	Collecting 1Password password hashes
	Cracking 1Password password hashes
	Summary
Chapter 10: Cryptocurrency Wallet Passphrase Cracking
	Cryptocurrencies and blockchain explained
	Collecting and formatting Bitcoin/Litecoin wallet hashes
	Cracking Bitcoin/Litecoin wallet hashes
	Collecting and formatting Ethereum wallet hashes
	Cracking Ethereum wallet hashes
	Summary
Part 3: Conclusion
Chapter 11: Protections against Password Cracking Attacks
	How to choose a password more resistant to cracking attacks
	Additional protections against cracking attacks
	Summary
Index
Other Books You May Enjoy




نظرات کاربران