Password Cracking
Generating Password Mutations
: Do nothing.
l Lowercase all letters.
u Uppercase all letters.
c Capitalize the first letter and lowercase others.
sXY Replace all instances of X with Y.
$! Add the exclamation character at the end.# Rules are available at /usr/share/hashcat/rules/
hashcat --force password.list -r rule --stdout | sort -u > mut_password.listCracking Protected Archives
# Use John to crack protected files
office2john, ssh2john, pdf2john, zip2john, bitlocker2john etc
# Cracking OpenSSL Encrypted Archives
## Using a for-loop to Display Extracted Contents
for i in $(cat rockyou.txt);do openssl enc -aes-256-cbc -d -in $NAME.gzip -k $i 2>/dev/null| tar xz;doneGenerating Wordlists Using CeWL
Windows Password Attacks
Attacking SAM
Attacking LSSAS
Attacking NTDS.dit
Credential Hunting
Windows Lateral Movement
Pass The Hash (PtH)
Pass the Key or OverPass the Hash
Pass The Ticket (PtT)
Linux Password Attacks
Credential Hunting
Reading important files
Last updated